摘要:
A home security system includes interactive sensors and a controller in a controlled environment, such as a smart home environment. A central communication device is coupled, wired or wirelessly, directly or indirectly, to the interactive sensors and the controller. The interactive sensors include at least one heartbeat sensor to detect the presence of one or more human bodies and at least one emergency condition sensor to detect the presence of an emergency condition. In some implementations, the controller may determine the number of occupants based on the heartbeats of multiple human bodies detected by the heartbeat sensor. In some implementations, the number of occupants may be determined by the heartbeats detected by the heartbeat sensor in conjunction with one or more other types of sensors, such as a body heat sensor.
摘要:
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one aspect, a system includes multiple robotic devices, multiple sensors, wherein the multiple sensors includes a first sensor, multiple charging stations, and a monitor control unit. The monitor control unit may include a network interface, one or more processors, and one or more storage devices that include instructions to cause the one or more processors to perform operations. The operations may include receiving data from the first sensor that is indicative of an alarm event, accessing information describing the capabilities of the each of the robotic devices, selecting a subset of robotic devices from the multiple robotic devices, and transmitting a command to each robotic device in the subset of robotic devices that instructs each respective robotic device to deploy to the location of the first sensor.
摘要:
Systems and methods for visualizing the history of events are provided. Some methods can include displaying, on a user interface device, a BIM of a secured area, displaying, on the BIM on the user interface device, a respective representation of each of a plurality of sensors within the secured area, the respective representation being displayed on the BIM at a respective location corresponding to respective geographic coordinates of a respective one of the plurality of sensors in the secured area, receiving first user input indicative of a specified time, and displaying, on the BIM on the user interface device, a respective geographic indicator of at least one of the plurality of sensors that was active at the specified time, the respective geographic indicator being displayed at or connected to the respective location on the BIM of the respective representation of the at least one of the plurality of sensors.
摘要:
A method and apparatus are provided. The method includes the steps of detecting a plurality of events within a secured area detected by respective sensors that have been activated within a predetermined time period of one another, wherein at least one of the plurality of events is an alarm event, ordering the plurality of events based upon a reporting time of each of the plurality of events, and displaying a map showing the respective sensors that have been activated within a predetermined time period of one another within the secured area along with a potential route of an intruder traveling among locations of the respective sensors that have been activated within a predetermined time period of one another in accordance with the reporting time of each of the plurality of events.
摘要:
Method for performing electronic article surveillance includes generating image data using at least one imaging device. The image data is processed in a computer processing device associated with an electronic article surveillance (EAS) pedestal to recognize the presence of a facial image. Based on such processing, data representative of the facial image is selectively communicated to a server at a location remote from the EAS pedestal. Subsequently, a notification is received from the server. The notification is based on an identification analysis involving actions performed at the server to identify a particular person using the facial image data. Thereafter, at least one EAS operation is selectively controlled at the EAS pedestal based on a content of the notification.
摘要:
A video surveillance system is set up, calibrated, tasked, and operated. The system extracts video primitives and extracts event occurrences from the video primitives using event discriminators. The system can undertake a response, such as an alarm, based on extracted event occurrences.
摘要:
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one aspect, a system includes a virtual reality headset, a plurality of cameras, a plurality of sensors that includes a first sensor, a control unit, wherein the control unit includes a network interface, a processor, a storage device that includes instructions to perform operations that comprise receiving data from the first sensor that is indicative of an alarm event, determining a location of the first sensor, identifying a set of one or more cameras from the plurality of cameras that are associated with the first sensor, selecting a particular camera from the identified set of one or more cameras; and transmitting one or more instructions to the particular camera that command the particular camera to stream a live video feed to a user interface of the virtual reality headset.
摘要:
Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from one or more sensors are captured and analyzed to detect one or more events in the sensory data. The events are correlated by a correlation engine, optionally by weighing the events based on attributes of the sensors that were used to detect the primitive events. The events are then monitored for an occurrence of one or more correlations of interest, or one or more critical events of interest. Finally, one or more actions are triggered based on a detection of one or more correlations of interest, one or more anomalous events, or one or more critical events of interest. Events may come from sensory devices, legacy systems, third-party systems, anonymous tips, and other data sources. The present invention may be used to increase business productivity by improving security, safety, and increasing profitability of business processes.
摘要:
Methods, systems, and products are disclosed for alarm sensors in security systems. A powerline-to-Ethernet adapter interfaces with an alarm sensor and converts alternating current electrical power into direct current electrical power. Wires in a cable convey the direct current electrical power to the alarm sensor, and other wires in the cable convey Ethernet signals to the alarm sensor. The alarm sensor is electrically powered by the direct current electrical power and the Ethernet signals are received at an Ethernet interface.
摘要:
A method and apparatus for choosing mobile telephones within a security social network is provided herein. Choosing mobile telephones may take place on a server side or a mobile telephone side. Even though mobile telephones lie within a particular area of interest, no image will be obtained/provided from the mobile telephone when a predetermined condition is met. This will greatly reduce an amount of images provided by mobile telephones along with reducing the possibility of an unwanted image being obtained.