SYSTEM AND METHOD FOR SCALABLE VIDEO CLOUD SERVICES
    1.
    发明申请
    SYSTEM AND METHOD FOR SCALABLE VIDEO CLOUD SERVICES 审中-公开
    可扩展视频云服务的系统和方法

    公开(公告)号:WO2015013315A1

    公开(公告)日:2015-01-29

    申请号:PCT/US2014/047672

    申请日:2014-07-22

    Abstract: Methods of monitoring real-world environments using a plurality of processor controlled Internet video cameras, scalable cloud computing technology, and various Internet connected smartphones and tablet computers. The system uses cloud computing technology, including automated service provisioning, automated virtual machine migration services, RESTful API, and various firewall traversing methods to scale to up to millions of cameras and beyond. The integrity of the system is maintained by requiring that the various video cameras continually send "heartbeat" camera status messages to the cloud servers. The video cameras can optionally also be configured to automatically detect various events occurring in their local environments, report these events to clients, and stream event video data either directly or indirectly to the clients, or alternatively save the video data in various scalable third party cloud storage systems such as the Amazon S3 service. Time expiring tokens and encryption keys help ensure system security.

    Abstract translation: 使用多个处理器控制的因特网摄像机,可扩展的云计算技术以及各种因特网连接的智能电话和平板计算机监视现实环境的方法。 该系统使用云计算技术,包括自动化服务配置,自动化虚拟机迁移服务,RESTful API和各种防火墙穿越方法,以扩展到数百万台摄像机及以上。 通过要求各种摄像机连续向云服务器发送“心跳”摄像机状态消息来维持系统的完整性。 视频摄像机还可以被配置为自动检测在其本地环境中发生的各种事件,将这些事件报告给客户端,以及将事件视频数据直接或间接地传送到客户端,或者将视频数据保存在各种可扩展的第三方云 存储系统,如Amazon S3服务。 时间到期令牌和加密密钥有助于确保系统安全。

    METHOD OF TRACKING MOVEABLE OBJECTS BY COMBINING DATA OBTAINED FROM MULTIPLE SENSOR TYPES
    2.
    发明申请
    METHOD OF TRACKING MOVEABLE OBJECTS BY COMBINING DATA OBTAINED FROM MULTIPLE SENSOR TYPES 审中-公开
    通过组合从多个传感器类型获得的数据跟踪移动物体的方法

    公开(公告)号:WO2014205425A1

    公开(公告)日:2014-12-24

    申请号:PCT/US2014/043539

    申请日:2014-06-21

    Abstract: Method of tracking moveable objects (tagged objects that are moved by actors e.g. people, vehicles) by combining and analyzing data obtained from multiple types of sensors, such as video cameras, RFID tag readers, GPS sensors, and WiFi transceivers. Objects are tagged by RFID tags, NFC tags, bar codes, or even tagged by visual appearance. The system operates in near real-time, and compensates for errors in sensor readings and missing sensor data by modeling object and actor movement according to a plurality of possible paths, weighting data from some sensors higher than others according to estimates of sensor accuracy, and weighing the probability of certain paths according to various other rules and penalty cost parameters. The system can maintain a comprehensive database which can be queried as to which actors associate with which objects, and vice versa. Other data pertaining to object location and association can also be obtained.

    Abstract translation: 通过组合和分析从诸如摄像机,RFID标签读取器,GPS传感器和WiFi收发器的多种类型的传感器获得的数据来跟踪可移动物体(被演员例如人,车辆移动的被标记物体)的方法。 物体被RFID标签,NFC标签,条形码标记,甚至被视觉外观标记。 该系统近乎实时操作,通过根据多个可能的路径建模对象和演员移动来补偿传感器读数误差和传感器数据丢失,根据传感器精度的估计,来自某些传感器的数据加权比其他传感器更高;以及 根据各种其他规则和惩罚成本参数权衡某些路径的概率。 该系统可以维护一个综合数据库,可以查询与哪些对象相关联的哪个对象,反之亦然。 还可以获得与对象位置和关联有关的其他数据。

    REFERENCE IMAGE ENROLLMENT AND EVOLUTION FOR SECURITY SYSTEMS

    公开(公告)号:US20240184868A1

    公开(公告)日:2024-06-06

    申请号:US18427370

    申请日:2024-01-30

    CPC classification number: G06F21/32 G06F18/22 G06N3/08 G06V20/56 G06V40/172

    Abstract: Person or object authentication can be performed using artificial intelligence-enabled systems. Reference information, such as for use in comparisons or assessments for authentication, can be updated over time to accommodate changes in an individual's appearance, voice, or behavior. In an example, reference information can be updated automatically with test data, or reference information can be updated conditionally, based on instructions from a system administrator. Various types of media can be used for authentication, including image information, audio information, or biometric information. In an example, authentication can be performed wholly or partially at an edge device such as a security panel in an installed security system.

    Audio type detection
    5.
    发明授权

    公开(公告)号:US12142261B2

    公开(公告)日:2024-11-12

    申请号:US17203269

    申请日:2021-03-16

    Abstract: Artificial intelligence-based processing can be used to classify audio information received from an audio input unit. In an example, audio information can be received from a microphone configured to monitor an environment. A processor circuit can identify identifying one or more features of the audio information received from the microphone and use a first applied machine learning algorithm to analyze the one or more features and determine whether the audio information includes an indication of an abnormal event in the environment. In an example, the processor circuit can use a different second applied machine learning algorithm, such as a neural network-based deep learning algorithm, to analyze the same one or more features and classify the audio information as including an indication of a particular event type in the environment.

    Enrollment System with Continuous Learning and Confirmation

    公开(公告)号:US20220292170A1

    公开(公告)日:2022-09-15

    申请号:US17200584

    申请日:2021-03-12

    Abstract: Person or object authentication can be performed using artificial intelligence-enabled systems. Reference information, such as for use in comparisons or assessments for authentication, can be updated over time to accommodate changes in an individual's appearance, voice, or behavior. In an example, reference information can be updated automatically with test data, or reference information can be updated conditionally, based on instructions from a system administrator. Various types of media can be used for authentication, including image information, audio information, or biometric information. In an example, authentication can be performed wholly or partially at an edge device such as a security panel in an installed security system.

    SYSTEM AND METHOD FOR SCALABLE VIDEO CLOUD SERVICES
    9.
    发明申请
    SYSTEM AND METHOD FOR SCALABLE VIDEO CLOUD SERVICES 审中-公开
    可扩展视频云服务的系统和方法

    公开(公告)号:US20150022666A1

    公开(公告)日:2015-01-22

    申请号:US14337962

    申请日:2014-07-22

    Abstract: Methods of monitoring real-world environments using a plurality of processor controlled Internet video cameras, scalable cloud computing technology, and various Internet connected smartphones and tablet computers. The system is designed to use cloud computing technology, including automated service provisioning, automated virtual machine migration services, RESTful API, and various firewall traversing methods to scale to up to millions of cameras and beyond. The integrity of the system is maintained by requiring that the various video cameras continually send “heartbeat” camera status messages to the cloud servers. The video cameras can optionally also be configured to automatically detect various events occurring in their local environments, report these events to clients, and stream event video data either directly or indirectly to the clients, or alternatively save the video data in various scalable third party cloud storage systems such as the Amazon S3 service. Time expiring tokens and encryption keys help ensure system security.

    Abstract translation: 使用多个处理器控制的因特网摄像机,可扩展的云计算技术以及各种因特网连接的智能电话和平板计算机监视现实环境的方法。 该系统旨在使用云计算技术,包括自动化服务配置,自动化虚拟机迁移服务,RESTful API和各种防火墙穿越方法,以扩展到数百万台摄像机及以上。 通过要求各种摄像机连续向云服务器发送“心跳”摄像机状态消息来维持系统的完整性。 视频摄像机还可以被配置为自动检测在其本地环境中发生的各种事件,将这些事件报告给客户端,以及将事件视频数据直接或间接地传送到客户端,或者将视频数据保存在各种可扩展的第三方云 存储系统,如Amazon S3服务。 时间到期令牌和加密密钥有助于确保系统安全。

    MULTIPLE-FACTOR RECOGNITION AND VALIDATION FOR SECURITY SYSTEMS

    公开(公告)号:US20250014409A1

    公开(公告)日:2025-01-09

    申请号:US18735963

    申请日:2024-06-06

    Abstract: A security system can conditionally grant or deny access to a protected area using an artificial intelligence system to analyze images. In an example, an access control method can include receiving candidate information about a face and gesture from a first individual and receiving other image information from or about a second individual. The candidate information can be analyzed using a neural network-based recognition processor that can provide a first recognition result indicating whether the first individual corresponds to a first enrollee of the security system, and can provide a second recognition result indicating whether the second individual corresponds to a second enrollee of the security system. The example method can include receiving a passcode, such as from the first individual. Access can be conditionally granted or denied based on the passcode and the recognition results.

Patent Agency Ranking