A system may be configured to perform multi-stream bandwidth dispersal. In some aspects, the system may receive, via a communication network, a plurality of frame collections from a video capture device and one or more other video capture devices, and detect a congestion context based upon the plurality of frame collections. Further, the system may determine a schedule notification for the video capture device, the schedule notification providing instruction for transmitting a frame of a frame collection, and transmit, via the communication network, the schedule notification to the video capture device.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 5/77 - Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
H04N 7/12 - Systems in which the television signal is transmitted via one channel or a plurality of parallel channels, the bandwidth of each channel being less than the bandwidth of the television signal
H04N 5/917 - Television signal processing therefor for bandwidth reduction
H04N 5/915 - Television signal processing therefor for field- or frame-skip recording or reproducing
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
Example aspects include a method, an apparatus and a computer-readable medium of operating an access control system, comprising detecting whether a person has sanitized one or more body parts of the person. The aspects further include obtaining, in response to detecting that the person has sanitized the one or more body parts, access credentials of the person. Additionally, the aspects further include determining whether to grant access to the person based at least on the access credentials and detecting that the person has sanitized the one or more body parts.
Example aspects include a method, an apparatus and a computer-readable medium of enforcing a mask wearing rule, comprising monitoring video frames of one or more video feeds. The aspects further include detecting a person in at least one video frame of the video frames. The at least one video frame corresponding to a first area of one or more areas. Additionally, the aspects further include determining whether the person is in violation of a mask wearing rule. Additionally, the aspects further include generating an alert in response to determining that the person is in violation of the mask wearing rule.
Example aspects include a method, apparatus, and computer-readable medium for surveillance data processing for sanitation verification, comprising determining, by a processor based on area identification information received by a surveillance system of a premises, that an area of the premises requires periodic sanitation. The aspects further include determining, by the processor based on data captured by one or more sensors of the surveillance system, whether one or more persons associated with the cleaning staff profile have visited the area within a threshold period of time. Additionally, the aspects further include sending, by the processor, a first notification to a facilities management device in response to the one or more persons associated with the cleaning staff profile not having visited the area within the threshold period of time.
G08B 21/24 - Reminder alarms, e.g. anti-loss alarms
G07C 9/32 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check
G07C 9/38 - Individual registration on entry or exit not involving the use of a pass with central registration
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G07C 1/10 - Registering, indicating, or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
5.
SYSTEM AND METHOD FOR CONTROLLING BUILDING MANAGEMENT SYSTEMS FOR SCHEDULED EVENTS
An event automation system controls building management systems (e.g. building automation, access control, and/or security systems of a building) for scheduled events. An occupancy module generates occupancy information for event spaces where events are scheduled via occupancy sensors installed at the event spaces. A building automation module instructs distributed devices of the building management systems to control the environmental settings of the event spaces based on the occupancy information and stored space, attendee, and schedule information. The event automation system also facilitates scheduling the events at event spaces of the building based on configuration information from an event organizer (e.g. invited attendees, start and end times, and activities to be performed at the event), required automation features for the event, location information and exercise preferences for the invited attendees, and/or aggregated usage information for the event spaces.
Example aspects include a method, apparatus and computer-readable medium of enforcing a mask wearing policy, comprising monitoring video frames of one or more video feeds. The aspects further include detecting one or more persons in the video frames. Additionally, the aspects further include determining whether the one or more persons are in violation of a mask wearing policy. Additionally, the aspects further include generating an alert in response to determining that the one or more persons are in violation of the mask wearing policy.
An access control system (ACS) captures a screenshot of a portion of a computer display of the ACS, the portion displaying one or more images of an area of interest of the ACS. The ACS detects a face of a person in the captured screenshot. For at least one detected face, the ACS identifies one or more candidate identities based on recognizing the at least one detected face. The ACS then displays, on the computer display, each candidate identity.
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
A system may be configured to perform enhanced detection of occluded objects in a multiple object detection system. In some aspects, the system may transmit, by an application to an internet of things (IoT) device, an actual representational state transfer (REST) request including a parameter and an application authentication credential for authenticating to the IoT device, determine, based on an expected REST response to the actual REST request, one or more conditional parameters for configuring the IoT device, transmit, without waiting for the expected REST response, a predictive REST request including the one or more conditional parameters, and receive an actual response indicating success of the configuring the IoT device.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 41/28 - Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
G16Y 10/75 - Information technology; Communication
An access control system includes an identification unit having an infrared (IR) transmitter, an IR detector that receives reflected IR radiation from one or more body parts of the user, one or more signal processing components to determine a temperature of the user, a hand sanitization unit that sanitizes hands of the user when the hands are placed in a palm placement area, and an identification device to receive identification information of the user. The access control system also includes a processor that receives the reading of the user, instructs a door lock controller to unlock a door when the temperature is below the threshold temperature or the temperature is within the temperature range. The processor sends an alert when the temperature is above the threshold temperature or the temperature is outside the temperature range, and sends identification information of the user to one or more network devices.
A computer displays a marker indicating a point-of-interest in a map display. The marker is characterized by a pole and a polar axis. The marker includes a band characterized by a radial width between an inner radial edge and an outer radial edge in relation to the pole, and an angular extent in relation to the polar axis. At least one of the radial width and the angular extent is a function of a feature of the point-of-interest.
Example implementations include a method, apparatus and computer-readable medium for determining a set of temperature readings of a person attempting to proceed beyond an area. The implementations further include detecting the person entering the area and detecting a facial area of the person. The implementations further include sending location information of the facial area to a sensing device. The implementations further include generating a thermal image of the person and determining a first set of temperature readings. The implementations further include determining a first set of temperature differences comprising one or more temperature differences between the temperature readings in the first set. The implementations further include determining whether one or more of the temperature differences in the first set does not satisfy a threshold and generating a notification in response to the determination. Additionally, the implementations include transmitting the notification to one or more output devices.
G07C 9/26 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
13.
SYSTEMS AND METHODS OF IDENTIFYING PERSONS-OF-INTEREST
Disclosed herein are systems, methods, and non-transitory computer readable mediums directed to tracing a person of interest (POI) using video. As provided herein, images of a POI are obtained, such as from a data store, and then the POI is identified in one or more video frames of a monitored video feed by comparing the monitored video frames to the images of the POI using facial recognition techniques. If the POI is identified, additional persons within a prescribed distance threshold of the POI are determined and identified using facial recognition techniques. Thereafter, a list of each identified person within the distance threshold of the POI is generated and may be transmitted to a desired recipient.
An access validation device includes a user interface and one or more processors. The user interface includes at least one of a display and an audio output device. The one or more processors cause an identity wallet to generate a credential regarding a medical status of a user using credential data representative of the status received from a distributed ledger. The one or more processors cause the identity wallet to present an indication of the status using the user interface.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
15.
WIRELESS ENVIRONMENTAL DATA CAPTURE SYSTEM AND METHOD FOR MESH NETWORKING
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
A system provides ultra-wideband (UWB) positioning. The system exchanges ranging signals at a first rate between a UWB beacon and a UWB tag. The system then determines movement or location information of the UWB tag; and select, based on the movement or location information, a second rate for exchanging subsequent ranging signals between the UWB beacon and the UWB tag. The system then exchanges the subsequent ranging signals at the second rate between the UWB beacon and the UWB tag.
H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/029 - Location-based management or tracking services
G01S 1/02 - Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith using radio waves
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
A61B 5/0205 - Simultaneously evaluating both cardiovascular conditions and different types of body conditions, e.g. heart and respiratory condition
A61B 5/00 - Measuring for diagnostic purposes ; Identification of persons
A63B 24/00 - Electric or electronic controls for exercising apparatus of groups
D03D 1/00 - Woven fabrics designed to make specified articles
D03D 13/00 - Woven fabrics characterised by the special disposition of the warp or weft threads, e.g. with curved weft threads, with discontinuous warp threads, with diagonal warp or weft
D03D 15/00 - Woven fabrics characterised by the material, structure or properties of the fibres, filaments, yarns, threads or other warp or weft elements used
G09B 19/00 - Teaching not covered by other main groups of this subclass
17.
Methods and System for Monitoring and Assessing Employee Moods
Methods and system for monitoring and assessing employee moods are disclosed. A proposed enterprise employee monitoring system includes surveillance cameras, a facial recognition module, an emotional analyzer module, and an employee database. The surveillance cameras capture image data including employee individuals within the enterprise. The facial recognition module identifies the individuals in the image data, and the emotional analyzer module determines an emotional state of the individuals based upon the image data. The employee database stores employee information and the emotional state information from the emotional analyzer module, based upon the identification performed by the facial recognition module.
Methods and system for distributed cameras and demographics analysis are disclosed. In one embodiment, the enterprise security system includes a tracking system for tracking individuals within the enterprise, surveillance cameras that capture image data including the individuals within the enterprise, a physical classifier module for determining physical characteristics of the individuals in the image data, and a security integration system for determining whether the tracked individuals match the physical characteristics.
G07C 9/00 - Individual registration on entry or exit
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
19.
Methods and System for Employee Monitoring and Business Rule and Quorum Compliance Monitoring
Methods and system for employee monitoring and business rule and quorum compliance monitoring are disclosed. A proposed system includes one or more tracking systems for tracking movement of individuals in an enterprise, databases of business rules and operations schedules, and a business rules validation system for determining whether compliance with the business rules based on the operations schedule and the movement of the individuals in the enterprise has been achieved.
A computer device for enhancing security of a secured area that comprises a video input device and a processor configured to receive a request to access the secured area at an access point associated with the secured area, obtain an image data of a secure boundary area associated with the access point, determine the number of users in the secure boundary area based on the image data, determine whether to grant an access in response to the request based on one or more rules, grant the access in response to the request in accordance with the rules when the number of users in the secure boundary area is less than or equal to a threshold, and deny the access in response to the request in accordance with the rules and when the number of users in the secure boundary area is greater than the threshold.
G07C 9/15 - Movable barriers with registering means with arrangements to prevent the passage of more than one individual at a time
G07C 9/00 - Individual registration on entry or exit
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
A video summarization device includes a user input device, a communications interface, a processing circuit, and a display device. The user input device receives a first request to view a plurality of video streams including an indication of a first time associated with the plurality of video streams. The processing circuit transmits, via the communications interface, a second request to retrieve a plurality of image frames based on the indication of the first time to at least one of a first database and a second database. The processing circuit receives, from the at least one of the first database and the second database, the plurality of image frames. The processing circuit provides, to the display device, a representation of a plurality of video stream objects corresponding to the plurality of image frames received from the at least one of a first database and a second database.
An access control device including a keypad member and an communication module. The keypad member may include a substrate layer having a mounting surface and an internal surface, and a capacitive sensing layer mounted on the internal surface of the substrate layer and including a keypad circuit having a plurality of capacitive sensors defining a plurality of keys. They keypad circuit may include a clear conductive ink. The keypad member may further include a user interface layer mounted on the capacitive sensing layer. The access control device may be configured to be in communication with the capacitive sensing layer and have a mounting structure positioned at a spacing distance from the mounting surface of the substrate layer and a communication link electrically connecting the communication module and the capacitive sensing layer.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media that perform the steps of receiving one or more snapshots, extracting one or more features from the one or more snapshots, and providing the one or more features to a first classification layer for classifying a first target and a second classification layer for re-identifying a second target.
Aspects of the present disclosure include methods, apparatus, and systems for configuring a security camera including establishing a first connection between the dongle and the security camera through a communication port of the dongle, establishing a second connection with a mobile device, transmitting a request to the mobile device via the second connection, receiving, in response to the request, a configuration credential from the mobile device via the second connection, wherein the configuration credential is provided by the mobile device without disclosing the configuration credential to an operator of the mobile device, transmitting, via the first connection, the configuration credential to the security camera, receiving, in response to providing the configuration credential, a video stream from the security camera via the first connection, and transmitting, via the second connection, the video stream to the mobile device.
G08B 13/19 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 28/18 - Negotiating wireless communication parameters
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 12/069 - Authentication using certificates or pre-shared keys
25.
Methods and System for Controlling Access to Enterprise Resources Based on Tracking
Methods and systems for controlling access to enterprise resources based on tracking are disclosed. In one implementation, an enterprise security system includes one or more tracking systems, an information technology (IT) system, and a security integration system (SIS). The one or more tracking systems track movement of individuals throughout the enterprise. The SIS blocks access to the computer resources based on the tracked movement of the individuals within the enterprise.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/02 - Services making use of location information
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
26.
METHODS AND SYSTEMS FOR AN ACCESS CONTROL SYSTEM USING VISUAL RECOGNITION
A visual feedback access control device and methods for use thereof. The visual feedback access control device may comprise a camera configured to obtain an image. The visual feedback access control device may also comprise a plurality of light emitting diodes (“LEDs”) arranged in an plurality of segments relative to the camera. The visual feedback access control device may also comprise where the plurality segments being individually controllable. The visual feedback access control device may also comprise having the LEDs configured to illuminate upon a received control signal based upon one or more access control trigger events.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06K 9/62 - Methods or arrangements for recognition using electronic means
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Aspects of the present disclosure include methods, apparatuses, and computer readable media for controlling access including receiving registration information associating a mobile device with an access device, wherein the access device provides an access privilege to an access-controlled point, associating the mobile device with the access device, receiving a blocking request from the mobile device to suspend the access privilege to the access-controlled point provided by the access device, authenticating the blocking request, and suspending, in response to authenticating the blocking request, the access privilege to the access-controlled point provided by the access device. In another aspect, methods, apparatuses, and computer readable media for controlling access may include receiving an unblocking request from the mobile device to restore the access privilege to the access-controlled point, authenticating the unblocking request, restoring, in response to authenticating the unblocking request, the access privilege to the access-controlled point provided by the access device.
Systems and methods for virtualized computing or cloud-computing network with distributed input devices and at least one remote server computer for automatically analyzing received video, audio and/or image inputs for providing social security and/or surveillance for a surveillance environment, surveillance event, and/or surveillance target.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04N 13/275 - Image signal generators from 3D object models, e.g. computer-generated stereoscopic image signals
G05D 1/02 - Control of position or course in two dimensions
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06T 19/00 - Manipulating 3D models or images for computer graphics
H04N 13/239 - Image signal generators using stereoscopic image cameras using two 2D image sensors having a relative position equal to or related to the interocular distance
A system provides ultra-wideband (UWB) positioning. The system exchanges ranging signals at a first rate between a UWB beacon and a UWB tag. The system then determines movement or location information of the UWB tag; and select, based on the movement or location information, a second rate for exchanging subsequent ranging signals between the UWB beacon and the UWB tag. The system then exchanges the subsequent ranging signals at the second rate between the UWB beacon and the UWB tag.
G01S 5/14 - Determining absolute distances from a plurality of spaced points of known location
H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/029 - Location-based management or tracking services
G01S 1/02 - Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith using radio waves
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
A61B 5/0205 - Simultaneously evaluating both cardiovascular conditions and different types of body conditions, e.g. heart and respiratory condition
A61B 5/00 - Measuring for diagnostic purposes ; Identification of persons
A63B 24/00 - Electric or electronic controls for exercising apparatus of groups
D03D 1/00 - Woven fabrics designed to make specified articles
D03D 13/00 - Woven fabrics characterised by the special disposition of the warp or weft threads, e.g. with curved weft threads, with discontinuous warp threads, with diagonal warp or weft
D03D 15/00 - Woven fabrics characterised by the material, structure or properties of the fibres, filaments, yarns, threads or other warp or weft elements used
G09B 19/00 - Teaching not covered by other main groups of this subclass
A63F 13/212 - Input arrangements for video game devices characterised by their sensors, purposes or types using sensors worn by the player, e.g. for measuring heart beat or leg activity
A63F 13/285 - Generating tactile feedback signals via the game input device, e.g. force feedback
A surveillance system monitors a predetermined environment based on received data. The surveillance system includes a first intelligent appliance configured to capture video and/or still images and configured to be in wireless communication with a second intelligent appliance that operates based on data from the first intelligent appliance. The surveillance system can detect a person located within the predetermined environment and can track the person's movement. The surveillance system is configured to allow remote viewing of data and/or controlling cameras.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/173 - Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
A computer implemented method for controlling the environmental conditions of a building in accordance with feedback from the occupants of the building is provided. The method includes detecting, by one or more processors, an occupant within a building space, and transmitting, by the one or more processors, a notification message to an occupant device associated with the occupant. The notification message includes a request to provide occupant feedback. The method includes receiving, by the one or more processors, an occupant feedback message from the occupant device. The occupant feedback message includes one or more quality ratings associated with one or more building conditions. The method includes assigning, by the one or more processors, a weighting factor to the occupant feedback message and performing an action to modify at least one of the building conditions responsive to the weighted occupant feedback message.
F24F 11/54 - Control or safety arrangements characterised by user interfaces or communication using one central controller connected to several sub-controllers
F24F 11/57 - Remote control using telephone networks
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
35.
Systems and methods of multi-sensor cameras and remote imagers
A camera system includes a base including a processing circuit and a communications circuit, a plurality of imagers, and a plurality of connections. The processing circuit is positioned in the base. The plurality of imagers are coupled to the processing circuit via the communications circuit, each imager including a lens and a sensor module that receives light via the lens and outputs a plurality of images based on the received light. The plurality of connections couple each imager to the processing circuit via the communications circuit. Each imager is mounted to an outside surface of the base or spaced from the base, each connection including at least one of a wired connection and a wireless connection. The processing circuit receives the plurality of images from each imager via each respective connection and generates a combined image using the plurality of images.
A load control system includes a power supply, a load controller coupled to a load, and a supply controller. The load controller receives a first power having a first current level from the power supply, and uses the first power to cause a plurality of resistors to output a plurality of pre-defined codes. The supply controller receives the plurality of pre-defined codes, evaluates an output condition based on the plurality of pre-defined codes, and causes the power supply to output a second power having a second current level greater than the first level responsive to the plurality of pre-defined codes satisfying the output condition.
A camera system includes a camera, a drive system, and a processing circuit. The camera includes a lens and a sensor module that receives light and outputs images based on the received light. The drive system includes a track including a first member and a second member, the first member defining a first rail on an inner surface of the first member, the second member defining a second rail on an outer surface of the second member. The rails can be driven by gear or magnetic drive, and are connected in a cross pattern at a 45 degree latitude point, enabling pan and tilt movement to maintain a level image for multiple camera mounting orientations.
A surveillance system monitors a predetermined environment based on received data. The surveillance system includes a first intelligent appliance configured to capture video and/or still images and configured to be in wireless communication with a second intelligent appliance that operates based on data from the first intelligent appliance. The surveillance system can detect a person located within the predetermined environment and can track the person's movement. The surveillance system is configured to allow remote viewing of data and/or controlling cameras.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Disclosed is a networked system for detecting conditions at a physical premises. The networked system includes a local computer system configure to read a configuration file that determines processing performed by the local computer system and evaluate collected sensor data with respect to the configuration file, for first sensor data to be processed by the local computer, and execute unsupervised learning models to continually analyze the first sensor data to produce operational states and detect drift sequences that are correlated to stored determined conditions. The networked system also includes a remote computer system that execute unsupervised learning models to continually analyze the collected sensor information. An alert is asserted by at least one of the local computer and the remote computer based on the determined conditions.
G08B 25/14 - Central alarm receiver or annunciator arrangements
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
40.
Systems and methods of enabling blockchain-based building automation systems
A system includes a plurality of first building components, a private local blockchain, a second building component, and a client device. The private local blockchain includes a device ledger indicating each first building component, a transaction ledger maintaining a plurality of blocks corresponding to a transaction between at least two first building components and including at least one first unique identifier of the corresponding first building component and a timestamp of the transaction, a transaction processor that generates at least one block by executing a predetermined hash function using a previous block, and a local rule engine defining rules to evaluate a transaction. The second building component has at least one second unique identifier. The client device provides the at least one second unique identifier to the private local blockchain. The private local blockchain determines whether to add the second building component to the device ledger.
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
41.
Wireless environmental data capture system and method for mesh networking
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
A building automation system generates occupancy information for occupants of spaces of a building (e.g. quantity, identity and/or location of the occupants) based on occupancy sensors in the spaces. The occupancy sensors capture speech sounds originating from one or more occupants of the spaces and/or ultrasonic emissions originating from one or more user devices of the occupants are via microphone arrays. Audio data based on the captured sound is then generated. Position information for the sources of the sound is determined based on the audio data, and the audio data is enhanced based on the position information via a beamforming process. Occupancy information for the spaces is generated based on the audio data. Environmental conditions of the spaces are controlled based on the presence, absence, position, orientation, distribution and/or preferences of the occupants in the space.
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
A distributed transaction ledger (e.g. a blockchain) is used to track and validate changes in a building management system such as a building automation system, access control system, or security/surveillance system. The building management system 100 includes a series of distributed devices connected to a peer-to-peer validation network. The distributed devices generate transaction information during normal operation and broadcast the transaction information to the validation network. The validation network maintains a distributed transaction ledger for the building management system, for example, by validating the transaction information and distributing the transaction information across the validation network according to consensus criteria to be stored locally in multiple instances by nodes of the validation network, which can be dedicated computing devices and/or validator distributed devices. The distributed devices perform building management functions based on validated transaction information retrieved from the transaction ledger.
A student tracking system tracks students' location traveling to and from schools and provides information about the students to responsible parties associated with the students such as parents, bus drivers, school administrators, and faculty. Readers read identification information from tags (e.g. radiofrequency identification tags) associated with the students and/or entrance/exit points of school buses, school buildings and/or classrooms and send the identification information along with location information (e.g. via a global navigation satellite system receiver) to a tracking and authorization module, which generates event information for entering and exiting events at the entrance/exit points, verifies that the event information matches predetermined school schedule, bus and route information, detects anomalies in the event information, and generates attendance information. The tracking and authorization module sends the event, verification, anomaly and/or attendance information to devices operated by the responsible parties.
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/029 - Location-based management or tracking services
A distributed event engine for controlling distributed devices of a building management system executes as discrete event processes on distributed devices with sufficient computing power and availability. The distributed devices communicate via a peer-to-peer network and a distributed ledger (e.g. blockchain). An event engine configuration module assigns the event processes to the distributed devices based on device and capability information published to the distributed ledger. An edge device scoring process executing on the distributed devices executing the event processes determines which other distributed devices to control based on which devices are compatible with local event processes and/or electrically and geographically close, resulting in decreased latency, vulnerability to hacking and corruption of data.
A distributed transaction ledger (e.g. blockchain) is used to control access through access points in an access control system. During normal operation, access control devices (e.g. system controllers and door controllers) generate and broadcast transaction information to a validation network. The validation network maintains a distributed transaction ledger for the access control system, for example, by validating and distributing the transaction information across the validation network according to predetermined consensus criteria. The devices perform access control functions based on transaction information retrieved from the transaction ledger. Door controllers receive identification information from user devices (e.g. identification badges, mobile computing devices) and send the identification information to the validation network. A predetermined number of responding nodes generate verification information based on authorization information in the transaction ledger. If a predetermined proportion of the responding nodes indicate that the occupant is authorized, access is granted by the door controller.
G07C 9/00 - Individual registration on entry or exit
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 9/451 - Execution arrangements for user interfaces
G07C 9/00 - Individual registration on entry or exit
G06F 17/14 - Fourier, Walsh or analogous domain transformations
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
G06F 21/45 - Structures or tools for the administration of authentication
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
48.
System and method for identification and suppression of time varying background objects
A system and method for identification and suppression of time varying background objects is disclosed. A proposed surveillance security system includes an image analytics system and at least one surveillance camera. The image analytics system identifies objects within image data of a scene captured by the surveillance camera, and then analyzes the objects to determine whether each object is a foreground object or a dynamic background object. In examples, the image analytics system determines whether an object is a foreground object or a dynamic background object based upon movement and/or an appearance of the object. The surveillance security system does not send alerts to users of the system for objects determined to be dynamic background objects. When users request objects of interest, the dynamic background objects are also excluded from lists of objects sent in reply messages to the users.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
49.
Methods and apparatus for management of intrusion detection systems using verified identity
Disclosed are techniques for configuring an intrusion detection system, by receiving from a user device, a set of identity credentials, sending the set of identity credentials to an identity service to verify a user's identity that is associated with the set of credentials, receiving a result of the verification of the identity; and when verified, configuring the intrusion detection system to operate in a mode pre-selected based on the verified identity.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/26 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
A system and method for analysing queues in frames of video enables operators to preferably draw three regions of interest overlaid upon the video as short, medium, and long queue regions that form a notional queue area within the video. The regions are drawn with knowledge of, or in anticipation of, foreground objects such as individuals and vehicles waiting for service in a queue. Examples include retail point of sale locations or for automated teller machine (ATM) transactions. In conjunction with a video analytics system that analyses the movement of the foreground objects relative to the queue regions, the system determines the number of objects occupying each queue region, length of the queue, and other queue-related statistics. The system can then create reports and send messages that include the queue analysis results for directing operators to change their staffing resources as part of a real-time queue servicing and optimization response.
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04N 5/77 - Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
H04N 5/232 - Devices for controlling television cameras, e.g. remote control
A video summarization device includes a user input device, a communications interface, a processing circuit, and a display device. The user input device receives a first request to view a plurality of video streams including an indication of a first time associated with the plurality of video streams. The processing circuit transmits, via the communications interface, a second request to retrieve a plurality of image frames based on the indication of the first time to at least one of a first database and a second database. The processing circuit receives, from the at least one of the first database and the second database, the plurality of image frames. The processing circuit provides, to the display device, a representation of a plurality of video stream objects corresponding to the plurality of image frames received from the at least one of a first database and a second database.
Mains-powered components of a building management system can be separated from non-mains powered components, allowing for easier and more affordable installation of the latter. In one embodiment, distributed devices of the building management system include a base module and a secondary module. The base module inductively powers the secondary module, which performs a function of the building management system (e.g. generating sensor data). The secondary module is easily attached to and removed from the base module via an attachment mechanism (e.g. snapfit) without rewiring the device. In another embodiment, a control panel inductively powers one or more input-output blocks, which provide an interface between distributed devices and the control panel. The input-output blocks are easily attached to and removed from the control panel via the attachment mechanism.
Systems and methods for cloud-based surveillance for an operation area are disclosed. At least two input capture devices, at least one safety control device and at least one user device are communicatively connected to a cloud-based analytics platform. The cloud-based analytics platform automatically generates 3-Dimensional (3D) surveillance data based on received 2-Dimensional (2D) video and/or image inputs and perform advanced analytics and activates the at least one safety control device based on analytics data from advanced analytics.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
55.
Surveillance monitoring systems and methods for remotely viewing data and controlling cameras
A surveillance system monitors a predetermined environment based on received data. The surveillance system includes a first intelligent appliance configured to capture video and/or still images and configured to be in wireless communication with a second intelligent appliance that operates based on data from the first intelligent appliance. The surveillance system can detect a person located within the predetermined environment and can track the person's movement. The surveillance system is configured to allow remote viewing of data and/or controlling cameras.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Techniques for detecting physical conditions at a physical premises from collection of sensor information from plural sensors execute one or more unsupervised learning models to continually analyze the collected sensor information to produce operational states of sensor information, produce sequences of state transitions, detect during the continual analysis of sensor data that one or more of the sequences of state transitions is a drift sequence, correlate determined drift state sequence to a stored determined condition at the premises, and generate an alert based on the determined condition. Various uses are described for these techniques.
A system and method for a distributed earthquake analysis and reporting system are provided. The system includes a facility control system at a facility that obtains earthquake information sent from one or more seismic sensors, and sends the earthquake information over a network directly or indirectly to other facility control systems. The facilities which include the facility control systems can be owned/operated by different business organizations or by the same organization, in examples. The facility control system at each facility responds to received earthquake information from the other facility control systems by configuring building systems such as public address systems to warn building occupants, industrial machine controllers to stop machinery, and elevator controllers to stop elevators at a nearest floor and open its doors, in examples.
A system and method for identification and suppression of time varying background objects is disclosed. A proposed surveillance security system includes an image analytics system and at least one surveillance camera. The image analytics system identifies objects within image data of a scene captured by the surveillance camera, and then analyzes the objects to determine whether each object is a foreground object or a dynamic background object. In examples, the image analytics system determines whether an object is a foreground object or a dynamic background object based upon movement and/or an appearance of the object. The surveillance security system does not send alerts to users of the system for objects determined to be dynamic background objects. When users request objects of interest, the dynamic background objects are also excluded from lists of objects sent in reply messages to the users.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A system for monitoring a location may include a local agent device at the location, and at least one sub-system at the location. The sub-system(s) is in communication with the local agent device. The local agent device is configured to detect and automatically respond to a first event occurring at or within the sub-system(s) according to a first procedure. The local agent device is configured to contact a monitoring center that is remotely located from the location when the local agent device detects a second event occurring at or within the sub-system(s) according to a second procedure.
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 9/451 - Execution arrangements for user interfaces
G07C 9/00 - Individual registration on entry or exit
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G06F 17/14 - Fourier, Walsh or analogous domain transformations
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A surveillance system monitors a predetermined environment based on received data. The surveillance system includes a first intelligent appliance configured to capture video and/or still images and configured to be in wireless communication with a second intelligent appliance that operates based on data from the first intelligent appliance. The surveillance system can detect a person located within the predetermined environment and can track the person's movement. The surveillance system is configured to allow remote viewing of data and/or controlling cameras.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
A frictionless access control system and method providing ultrasonic user location are disclosed. The access control system authorizes users within proximity of an access point such as a door, based upon user information (e.g. credentials) sent in RF wireless messages from user devices carried by the users. When the users are authorized, the system instructs the user devices to transmit coded acoustic signals. An positioning unit at the access point includes an ultrasonic microphone array, which is located above the access point and detects the acoustic signals. The positioning unit determines an angle of arrival (AoA) of the acoustic signals at microphones of the array, and determines positions of the users relative to the access point from the AoA. In one implementation, pre-authorized users are granted access when the determined positions of the users are within an inner zone of the access point.
A surveillance camera and surveillance data management system includes a video management system with a data retention module for determining when surveillance data is deleted. Blocks of the surveillance data are deleted based on the ages of the blocks, which are calculated based on the difference between a recorded start date for each block and the current time and adjusted to subtract durations of periods of system downtime that occurred since the start date. The ages are also calculated using a counter, which is initialized to a predetermined value for each block and incremented or decremented only during uptime. In another embodiment, an override module determines an override status based on input from an interface, which can include a physical switch or a keyboard, mouse and display, and returns the override status. No surveillance data is deleted when the override status is true.
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06F 16/22 - Indexing; Data structures therefor; Storage structures
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
64.
Automatic camera ground plane calibration method and system
A surveillance camera system and method is disclosed. The system includes one or more surveillance cameras that capture images of scenes, and one or more calibration systems that automatically generate ground planes from the captured images from the surveillance cameras. Foreground objects in the scenes are then analyzed against the ground planes to determine whether the ground planes may require updating and/or recalculation.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06K 9/66 - Methods or arrangements for recognition using electronic means using simultaneous comparisons or correlations of the image signals with a plurality of references, e.g. resistor matrix references adjustable by an adaptive method, e.g. learning
G06T 7/246 - Analysis of motion using feature-based methods, e.g. the tracking of corners or segments
A security camera system includes a base unit and sensor modules for generating image data. The base unit includes several mounting sockets arranged at different elevational and azimuthal directions around the base unit, and the sensor modules attach, for example, magnetically, to the mounting sockets. The security camera system is capable of automatic detection of the location of the sensor modules, as the identification information for the mounting sockets to which the sensor modules are attached are identified by image analytics. A reference image depicting the security camera system or an area surrounding the security camera system is analyzed and the positions of the sensor modules are determined based on the reference image. In the latter example, the reference image includes markers designating points of reference visible to the sensor modules and is compared to image data generated by the sensor modules.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 17/00 - Diagnosis, testing or measuring for television systems or their details
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
66.
Security Camera System with Multi-Directional Mount and Method of Operation
A security camera system includes a base unit and sensor modules for generating image data. The base unit includes several mounting sockets arranged at different elevational and azimuthal directions around the base unit, and the sensor modules attach, for example, magnetically, to the mounting sockets. Each mounting socket includes a socket ID, which is used to stitch together the image data from different sensor modules. The sensor modules are powered wirelessly via induction and communicate wirelessly with the base unit via wireless transceivers and antennas. The security camera system is capable of automatic detection of the location of the sensor modules, as the socket IDs for the mounting sockets to which the sensor modules are attached are identified by various means including wireless beacons, signal strength positioning and/or triangulation, or via a temporary provisioning bubble that arranges socket ID designators in fields of view of each of the attached sensor modules.
Described are techniques for monitoring use of a shared resource, such as physical resource, for example, a motor vehicle. The techniques include receiving an electronic representation of a user's identity, by a vehicle access application executable in a computing system in the vehicle, sending by the computing system to an identity and access management system the received electronic representation of the user's identity, receiving by the computing system from the identity and access management system credentials that validate the electronic representation of the user's identity, and enabling by the computing system starting of the vehicle when the computing system receives the credentials that validated the user's identity.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G07C 9/00 - Individual registration on entry or exit
Disclosed are techniques for configuring an intrusion detection system, by receiving from a user device, a set of identity credentials, sending the set of identity credentials to an identity service to verify a user's identity that is associated with the set of credentials, receiving a result of the verification of the identity; and when verified, configuring the intrusion detection system to operate in a mode pre-selected based on the verified identity.
Disclosed are techniques for managing provisioning of a service. The techniques include requesting identity credentials from a device having a PII wallet for identity credentials of a potential user of the service, receiving the requested identity credentials, sending the received requested identity credentials to an identity and access management system, receiving a decision regarding verification of the requested identity credentials from the identity and access management system, and producing a notification in response to the received decision.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G07F 17/00 - Coin-freed apparatus for hiring articles; Coin-freed facilities or services
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
70.
Method and apparatus for verifying service of installed devices using RFID
A service management system validates service on building management systems. Devices of the building management systems include wireless transmitters (for example, radiofrequency identification (RFID) tags) for transmitting wireless signals containing identification information. During service, a technician reads the identification information using a mobile computing device (for example, an RFID reader) while also recording the signal strength of the wireless signals. The mobile computing sends the identification information and signal strength information to a connected services system along with information about the service, and a validation module confirms that the identification information and signal strength information indicates that the technician was actually in the vicinity of the devices that were serviced.
G08B 29/00 - Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
G08B 29/14 - Checking intermittently signalling or alarm systems checking the detection circuits
A system and method for a door is disclosed. The system includes a frame magnetic lock assembly mounted to a door frame, and a door magnetic lock assembly mounted to a door for receiving inductively transferred power from the frame magnetic lock assembly. The door system also includes a door electronics subsystem mounted to the door that includes a power management system that provides power to the door from the inductively transferred power, and charges an energy storage element at the door from the inductively transferred power. The power management system provides power to the door from the energy storage element when the inductively transferred power is not available at the door, such as when the door is open, and resumes providing power to the door from the inductively transferred power once the inductively transferred power is restored. Once restored, some of the inductive power recharges the energy storage element.
A system and method for a door system is disclosed. The system produces an inductive power transfer signal and modulates the inductive power transfer signal. The system also encodes data within the modulated inductive power transfer signal and transmits the signal at a door frame of a door. At the door, the system receives the modulated inductive power transfer signal and extracts data from the received signal, and transduces the received signal into a door power signal. The system also supports secure data transfer by encrypting the encoded data at the door frame and decrypting the extracted data at the door. As a result, the modulated inductive power transfer signal between the door frame and the door provides a secure wireless data transfer channel for configuring components at the door and/or displaying data at the door, while also providing power to components at the door.
E05B 47/00 - Operating or controlling locks or other fastening devices by electric or magnetic means
H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
E05C 19/16 - Devices holding the wing by magnetic or electromagnetic attraction
E05C 17/56 - Devices for holding wings open; Devices for limiting opening of wings or for holding wings open by a movable member extending between frame and wing; Braking devices, stops or buffers, combined therewith by magnetic or electromagnetic attraction
E05B 63/00 - Locks with special structural characteristics
H04B 5/00 - Near-field transmission systems, e.g. inductive loop type
G07C 9/20 - Individual registration on entry or exit involving the use of a pass
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
73.
Door system with power management system and method of operation thereof
A door system and method for a door system is disclosed. A door body of the door system carries access control system components such as access readers, request to exit devices, and possibly magnetic lock systems, in examples. In embodiments, other devices carried by the door body include detection devices that detect physical phenomena, an interactive display, a door controller, and a power management system. The power management system provides a source of power to the other devices carried by the door body.
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G07C 9/26 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
74.
Building bots interfacing with intrusion detection systems
Described are techniques that use an autonomous mobile unmanned machine that includes at least one sensor device suitable to verify an alarm condition. Upon assertion of an alarm condition message asserted as a result of a potential alarm condition existing within a facility, the machine receives a location of the alarm condition and is programmed with a route from a current location of the autonomous mobile unmanned machine to the location of the alarm condition. The at least one sensor device carried by the autonomous mobile unmanned machine collects sensor data at least at the location of the alarm condition and the machine sends to a system a message pertaining to status of the alarm condition.
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G05D 1/02 - Control of position or course in two dimensions
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
G05D 1/00 - Control of position, course, altitude, or attitude of land, water, air, or space vehicles, e.g. automatic pilot
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Techniques for an autonomous mobile unmanned machine such as an unmanned aerial vehicle or drone or a robot to access a closed door are described. The techniques include programming the autonomous mobile unmanned machine to pass through a particular location within a facility that has one or more doors, and sense by the autonomous mobile unmanned machines a beacon signal emanating from a beacon deployed in proximity to a first one of the one or more doors in the facility, by receiving the beacon signal by a receiver device on the autonomous mobile unmanned machines. The techniques send a message to either a server or an access control system when the autonomous mobile unmanned machines determines that it needs access through the door at the specified location identified by the beacon and receives a message from either the server or the access control system that the door has been unlocked.
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
Systems and methods for virtualized computing or cloud-computing network with distributed input devices and at least one remote server computer for automatically analyzing received video, audio and/or image inputs for providing social security and/or surveillance for a surveillance environment, surveillance event, and/or surveillance target.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 21/60 - Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client; Communication details between server and client
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04N 13/275 - Image signal generators from 3D object models, e.g. computer-generated stereoscopic image signals
G05D 1/02 - Control of position or course in two dimensions
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06T 19/00 - Manipulating 3D models or images for computer graphics
H04N 13/239 - Image signal generators using stereoscopic image cameras using two 2D image sensors having a relative position equal to or related to the interocular distance
78.
System and method for automated camera guard tour operation
A system and method for automated operation of a camera system provides for a positioning system that moves the camera system to a field of view to search for objects or events of interest to track. If objects or events of interest are detected prior to the expiration of a dwell timer, the dwell timer is interrupted and tracking of the objects or events of interest is initiated. To prevent the security camera from being distracted indefinitely by unimportant objects, the positioning system changes the field of view of the security system upon expiration of a track timer. Alternatively, if the security camera does not identify an object to track prior to expiration of a dwell timer, then the positioning system changes the field of view of the camera system to search for other objects or events of interest.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 5/262 - Studio circuits, e.g. for mixing, switching-over, change of character of image, other special effects
H04N 5/77 - Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
A video recorder cluster for use in a video surveillance system includes multiple recorder nodes that can each participate in processing of user-specified operations such as playback, recording, and analysis of the video streams. The video recorder cluster determines the required resources for processing the video data of streams, determines the available resources on each of the recorder nodes, and forwards the video data of the streams to recorder nodes that either include the required resources or include a preferred set of available resources in accordance with the required resources. The video recorder cluster presents a single cluster address for client user devices to access the resources of the video recorder cluster, thereby enabling the video recorder cluster to appear as a single virtual network video recorder to clients.
A system and method for a distributed earthquake analysis and reporting system are provided. The system includes a facility control system at a facility that obtains earthquake information sent from one or more seismic sensors, and sends the earthquake information over a network directly or indirectly to other facility control systems. The facilities which include the facility control systems can be owned/operated by different business organizations or by the same organization, in examples. The facility control system at each facility responds to received earthquake information from the other facility control systems by configuring building systems such as public address systems to warn building occupants, industrial machine controllers to stop machinery, and elevator controllers to stop elevators at a nearest floor and open its doors, in examples.
An access control system includes a mobile application executing on a mobile computing device rendering a graphical user interface (GUI), which presents available access points, which are prioritized based on predictions of the next access points to be engaged. These predictions are based on prioritized lists of access points associated with times of day, days of the week and/or locations. The prioritized lists are modified based on recently selected access points, authorization status, prescribed schedules and/or prescribed sequences of access points. A selection pane of the GUI includes graphical elements associated with the access points. Graphical elements associated with the access points predicted to be next engaged by the user are displayed near the top of the selection pane. An inferred location of the user, based on the predictions, is sent to a monitoring center in response to selecting a help request option.
H04W 4/029 - Location-based management or tracking services
H04W 4/02 - Services making use of location information
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
A system and method for transcoding and mixing of video data in a security video distribution system for a video security system in response to selection of video data. User devices such as mobile user devices can select displayed video data streams sent from the video security system and create new views of the selected video data streams without the prior steps of configuring and pushing new views from a server within the system. At the time of selection, user devices can specify operations to perform on the selected video data, such as zoom and combine. In a preferred embodiment, transcoding and mixing of video data streams within the security video distribution system utilizes shared memory between processes. This has advantages not only in equipment cost savings and efficiency, but also provides for real-time collaboration and sharing of video content in a video security system using mobile user devices.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
83.
System to provide a security technology and management portal
A system to facilitate management of surveillance devices, that are distributed over a monitored region, through a geographic information (GI) portal, having GI storage to store map data defining a geographic map of the monitored region. A GI manager unit (GIMU) to record, in the GI storage, asset position information with regarding locations for assets of interest within the monitored region. The GIMU obtains, from a remote surveillance device (SD) database, device-related records. The GIMU stores the device related records in the GI storage. The device records are associated with the surveillance devices installed in the monitored region. The device records include position tags that identify a location of the surveillance devices in the monitored region. The GIMU obtains, from a remote network (NW) database, network-related records. The GIMU stores the network related records in the GI storage. The network-related records associated with network devices are installed over the monitored region. The SD and NW databases are maintained and managed separately from the GI database by one or more independent management units. A display presents a geographic map of the monitored region with device markers and network links illustrated thereon. The device markers indicate positions of the surveillance devices relative to the geographic map. The network links indicate communications links between network devices. A user interface permits a user to select from the surveillance devices and network links. The GIMU makes available to the user the device related records and documents and the network related records and documents associated with the selected surveillance devices and network links.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 5/232 - Devices for controlling television cameras, e.g. remote control
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
The present invention concerns surveillance systems that flag the potential threats automatically using intelligent systems. It can then notify or automatically alert the security personnel of impending dangers. Such a system can lower the cognitive load on the security personnel and can assist them to bring to prioritize their attention to potential threats and thereby improve the overall efficiency of the system. There could also be savings in labor cost.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 21/02 - Alarms for ensuring the safety of persons
G06K 9/62 - Methods or arrangements for recognition using electronic means
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06K 9/46 - Extraction of features or characteristics of the image
A video display system and method for displaying video data of a scene are disclosed. In an embodiment, the system includes a user device that captures image data of a scene, and video management system (VMS) that provides image data of the scene captured by one or more surveillance cameras. The user device renders the captured image data of the scene from the one or more surveillance cameras to be from a perspective of the user device. In one example, the user device is an augmented reality device for replaying image data from the cameras.
A security system uses wireless access control readers that determine locations of beacon devices relative to thresholds of access points, a verification system for validating user information for users, and beacon devices that monitor for an activation input from their users and that signal the wireless access control readers when the activation input is received. The access point is then controlled based on the user information and the receipt of the activation input by the beacon devices. This addresses the problem of how the system infers intent at an access point. The security system no longer has to infer intent from possibly poor information concerning the location and movement of the users. Instead, the security system can simply determine gross proximity to the access point and then wait for the activation input.
A system and method for energy saving on access control products is disclosed. An access controller controls access control readers, which in turn enable access to a building and/or interior areas of the building. The access controller can identify the locations of the access control readers relative to the building, such as whether the access control readers are located on the perimeter of the building for controlling access to the building, or whether the access control readers are located within the building for controlling access to interior areas of the building. The access controller can then place one or more of the access control readers into a power saving state without compromising overall building security, such as placing interior access control readers into a power saving state when the building is assessed to be unoccupied.
A system and method for monitoring sensors via surveillance cameras is disclosed. In the system, surveillance cameras generating image data of scenes, where the sensors are included in the scenes. The sensors detect information concerning the scenes and encode the information so that it can be derived from the image data. Preferably, the sensors encode the information concerning the scenes by modulating a visible light source, the signals of which are captured within the image data by the cameras. An analytics system then analyzes the image data and decodes the information from the sensors encoded within the image data. Preferably, an integrated analytics system of the cameras executes the analysis. Exemplary sensors include sensors for detecting temperature, moisture, audio/voice, and product selection in a retail premises.
G06F 16/51 - Indexing; Data structures therefor; Storage structures
G06F 16/58 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A system and method for analyzing queues in frames of video enables operators to preferably draw three regions of interest overlaid upon the video as short, medium, and long queue regions that form a notional queue area within the video. The regions are drawn with knowledge of, or in anticipation of, foreground objects such as individuals and vehicles waiting for service in a queue. Examples include retail point of sale locations or for automated teller machine (ATM) transactions. In conjunction with a video analytics system that analyses the movement of the foreground objects relative to the queue regions, the system determines the number of objects occupying each queue region, length of the queue, and other queue-related statistics. The system can then create reports and send messages that include the queue analysis results for directing operators to change their staffing resources as part of a real-time queue servicing and optimization response.
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
H04N 7/173 - Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
An access control system includes a mesh network of nodes for tracking and authenticating users throughout a building. The nodes include wireless interfaces. The user devices send user information to the nodes, which send the user information to a verification and tracking system, which returns authentication status information. As the user moves throughout the building, the nodes calculate the proximity between the particular node and the user device and compare the calculated proximity information to that of nearby nodes. The user information and authentication status information is then handed off to the node determined to be closest to the user device and, in the case of door nodes connected to door controllers, is used to grant access to restricted areas of the building. Door nodes are equipped with directional antennas with an adjustable antenna assembly including two or more probes to eliminate dead zones around the door nodes.
Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.
G07C 9/00 - Individual registration on entry or exit
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 17/14 - Fourier, Walsh or analogous domain transformations
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Disclosed are techniques that use user devices and a server system to process employee generated requests to allow guest access registration. A server system receives a request for guest registration and the server system sends in response to the request a message to a guest user device with the message including a request for user credentials. The user credentials are supplied from a user's PII wallet carried by the user. The server system receives from an employee user device a verification of the guest registration, produces an access policy for the guest user device and causes the produced policy and guest credentials to be stored in a distributed ledger system.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 9/451 - Execution arrangements for user interfaces
G07C 9/00 - Individual registration on entry or exit
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G06F 17/14 - Fourier, Walsh or analogous domain transformations
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
G06K 5/00 - Methods or arrangements for verifying the correctness of markings on a record carrier; Column-detection devices
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 9/451 - Execution arrangements for user interfaces
G07C 9/00 - Individual registration on entry or exit
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
H04W 12/069 - Authentication using certificates or pre-shared keys
H04W 12/084 - Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
G06F 17/14 - Fourier, Walsh or analogous domain transformations
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A testing system and method for a security system is disclosed. In one example, the testing system includes a mobile computing device carried by an operator such as a technician and a configuration server, the configuration server communicating with one or more of an intrusion detection subsystem, video surveillance subsystem, and/or access control subsystem and providing testing information to the mobile device. In one embodiment, the testing system provides configuration information to security devices within the subsystems, where the configuration information includes associations between the devices of the subsystems for executing testing upon the devices in the associations.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 9/451 - Execution arrangements for user interfaces
G06F 17/14 - Fourier, Walsh or analogous domain transformations
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G07C 9/00 - Individual registration on entry or exit
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
During a potential security event, a mobile application enters an alarm state and records audio, video and location event data and forwards the event data to a monitoring center, which stores the event data and takes appropriate action such as notifying local law enforcement. The alarm state is triggered manually, by the use of wireless sensors, or by arming the mobile application and then determining if it has been disarmed within a predetermined period of time.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
99.
Wireless environmental data capture system and method for mesh networking
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 76/15 - Setup of multiple wireless link connections
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast