Provided herein are systems and methods for implementing a video surveillance system. In one or more examples, the improved system can include a video managing system that applies one or more watchlists, to video footage captured by surveillance cameras to apply one or more processing policies indicated by the one or more watchlists. In some embodiments, a watchlist may indicate a plurality of events of interest (e.g., specific classes of objects, a presence of one or more persons, or one or more persons of interest, etc.) that should be detected from video footage. Through these mechanisms, video processing can be increased since the types of events of interest that need to be detected within the video footage are reduced. Non-transitory storage requirements are reduced, and human labor requirements to monitor, analyze, and review video surveillance footage is reduced.
H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c. à d. systèmes dans lesquels le signal vidéo n'est pas diffusé
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courte; Déclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
2.
Limiting video surveillance collection to authorized uses
Provided herein are systems and methods for automatically limiting video surveillance collection to authorized uses and authorized users. To achieve this control, the authorization system can be configured to manage and secure a plurality of crypto keys associated with encrypting a plurality of corresponding video footages and release a crypto key for a video footage at approved times to limit user access to the video footage. In particular, the surveillance system can generate a video collection including a copy of portions of a received video footage that include one or more approved events from a watchlist of a user. Thereafter, the video footage can be encrypted by a first key managed by the authorization system and prevents the user from accessing video content of the video footage once encrypted. Accordingly, the user may be limited to accessing the video collection and not all the portions in the encrypted video footage.
A method of detecting a counterfeit item using a contactless scanner includes contactlessly scanning at least a portion of an item to generate a scanned image of the at least a portion of the item, wherein the at least a portion of the item comprises a graphic, identifying elements in the scanned image that correspond to elements in the graphic, measuring the identified elements to generate a plurality of element measurements, determining whether the item is counterfeit based on a comparison between at least one element measurement of the plurality of element measurements and at least one reference element measurement that is associated with an authentic version of the item, and in response to determining that the item is counterfeit, generating an alert indicating a detection of a counterfeit item.
G06T 7/62 - Analyse des attributs géométriques de la superficie, du périmètre, du diamètre ou du volume
G07D 7/005 - Vérification par des marquages de sécurité invisibles à l’œil nu, p.ex. vérification de lignes épaissies, de marquages ou d'altérations discrets
G06Q 30/018 - Certification d’entreprises ou de produits
A method of detecting a counterfeit item using a contactless scanner includes contactlessly scanning at least a portion of an item to generate a scanned image of the at least a portion of the item, wherein the at least a portion of the item comprises a graphic, identifying elements in the scanned image that correspond to elements in the graphic, measuring the identified elements to generate a plurality of element measurements, determining whether the item is counterfeit based on a comparison between at least one element measurement of the plurality of element measurements and at least one reference element measurement that is associated with an authentic version of the item, and in response to determining that the item is counterfeit, generating an alert indicating a detection of a counterfeit item.
G07D 7/00 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p.ex. qui ne correspondent pas à une monnaie
G07D 7/12 - Lumière visible, rayonnement infrarouge ou ultraviolet