摘要:
A system includes plural sensor devices installed at a premises and a server computer coupled to a network and in communication with a gateway, which receives a risk profile for a physical premises, collect sensor information from the plural sensor devices and receives data feeds relevant to a location of the physical premises and execute one or more learning models to continually analyze the collected sensor information and data feeds to produce operational decisions based on the sensor information and data feeds to predict changes to risk profiles based on the continual analysis of sensor information and which determines responses to new risk profiles that are produced. The system also includes an engine for monitoring the sensor devices to recognize occurrences of events, and ask, through an interface to a human for additional information to confirm an occurrence of one or more of the events.
摘要:
A system includes plural sensor devices installed at a premises and a server computer coupled to a network and in communication with a gateway, which receives a risk profile for a physical premises, collect sensor information from the plural sensor devices and receives data feeds relevant to a location of the physical premises and execute one or more learning models to continually analyze the collected sensor information and data feeds to produce operational decisions based on the sensor information and data feeds to predict changes to risk profiles based on the continual analysis of sensor information and which determines responses to new risk profiles that are produced. The system also includes an engine for monitoring the sensor devices to recognize occurrences of events, and ask, through an interface to a human for additional information to confirm an occurrence of one or more of the events.
摘要:
A system includes plural sensor devices installed at a premises and a server computer coupled to a network and in communication with a gateway, which receives a risk profile for a physical premises, collect sensor information from the plural sensor devices and receives data feeds relevant to a location of the physical premises and execute one or more learning models to continually analyze the collected sensor information and data feeds to produce operational decisions based on the sensor information and data feeds to predict changes to risk profiles based on the continual analysis of sensor information and which determines responses to new risk profiles that are produced. The system also includes an engine for monitoring the sensor devices to recognize occurrences of events, and ask, through an interface to a human for additional information to confirm an occurrence of one or more of the events.
摘要:
Disclosed are techniques that use mixed reality, e.g., augmented reality and virtual reality technologies to improve analysis of security situations. These techniques merge the physical world embodied in security systems with the virtual world of policies and analytics. Upon receiving an assertion of an alarm condition from a security system that processes sensor signals a server sends messages to determine nearby sensors to turn on and start sending data back to the servers. Further implementations have the servers modify operation of the sensors to collect more relevant sensor data according to the alarm condition. The servers control a mixed reality device on which information such as a video feed is rendered on a display associated with the device, as well as data determined by the servers based on analysis of the received sensor data.
摘要:
Disclosed are techniques that use mixed reality, e.g., augmented reality and virtual reality technologies to improve analysis of security situations. The techniques allow a guard (or other user in a facility) to observe persons in a facility and determine merely by looking at such persons through a mixed reality device whether those persons are authorized to be in the facility or not, irrespective of whether those persons are required or not required to publically display some credentials, such as a badge or the like.
摘要:
Systems (100) and methods (400) for an object (1121) within an area (102). The methods involve: receiving, by a Radio Frequency Identification (“RFID”) tag (1141) coupled to the object, a Radio Frequency (“RF”) interrogator signal transmitted from an RFID reader (108); processing, by the RFID tag, the RF interrogator signal to determine if the RF interrogator signal applies thereto; and performing operations by the RFID tag to direct a person's attention directly to the object by activating at least one alerting mechanism (220) electrically and mechanically coupled to the RFID tag when the RF interrogator signal is determined to apply to the RFID tag. In some scenarios, the alerting is additionally or alternatively performed by a beacon (110).
摘要:
Systems (100) and methods (400) for an object (1121) within an area (102). The methods involve: receiving, by a Radio Frequency Identification (“RFID”) tag (1141) coupled to the object, a Radio Frequency (“RF”) interrogator signal transmitted from an RFID reader (108); processing, by the RFID tag, the RF interrogator signal to determine if the RF interrogator signal applies thereto; and performing operations by the RFID tag to direct a person's attention directly to the object by activating at least one alerting mechanism (220) electrically and mechanically coupled to the RFID tag when the RF interrogator signal is determined to apply to the RFID tag. In some scenarios, the alerting is additionally or alternatively performed by a beacon (110).