A process for enabling an emergency caller to selectively access information about incident-response resources. In operation, a public-safety answering point receives an emergency communication from a caller device associated with the emergency caller. The answering point obtains incident information relating to occurrence of an incident from the emergency communication and assigns one or more incident-response resources for responding to the incident. The answering point then verifies authenticity of the emergency caller and enables the emergency caller to selectively access information indicating a current status of the one or more of the incident-response resources as a function of verifying the authenticity of the emergency caller.
A process for enabling an emergency caller to selectively access information about incident-response resources. In operation, a public-safety answering point receives an emergency communication from a caller device associated with the emergency caller. The answering point obtains incident information relating to occurrence of an incident from the emergency communication and assigns one or more incident-response resources for responding to the incident. The answering point then verifies authenticity of the emergency caller and enables the emergency caller to selectively access information indicating a current status of the one or more of the incident-response resources as a function of verifying the authenticity of the emergency caller.
Techniques for notifying a guardian when an expected gesture from a monitored user is not received are provided. A start point and a destination point are received from the monitored user. A route from the start point to the destination point that includes a gesture monitoring point is determined. The gesture monitoring point includes a camera capable of gesture detection. A selection of the gesture monitoring points to be monitored is received. An expected gesture for each of the selected gesture monitoring points is received. A guardian to be informed when the expected gesture is not received. The monitored user is tracked as they traverse the route. The guardian is notified when the expected gesture for the selection of gesture monitoring points is not detected from the monitored user when the monitored user passes through a field of view of the camera associated with the selected gesture monitoring points.
A method and apparatus for notifying a public safety officer of public works projects is provided herein. During operation each public safety officer will have location data associated with the officer maintained at a public safety database. The location data comprises those locations most often frequented by the officer during their daily activities (e.g., while on the job). A public works database will be accessed by a server to determine locations of any active or future public works projects. An officer will only be notified of those public works projects when locations affected by the public works projects are nearby those locations most often frequented by the officer.
Techniques for initiating an existing workflow at a workflow server based on an artificial event notification are provided. An artificial event notification is received from a source external to a security ecosystem. The artificial event notification is related to an incident. The artificial event notification is mapped to a currently existing workflow within the workflow server. The currently existing workflow is associated with an internal trigger. The currently existing workflow is initiated based on the artificial event notification without receiving the internal trigger.
Techniques for modifying user access rights are provided. Access rights of the user are retrieved from an access control system token associated with the user. Access rights of a piece of equipment currently being operated by the user are retrieved from an access control system token associated with the piece of equipment. Access rights of a temporary token currently associated with the piece of equipment are retrieved from an access control system token associated with temporary token. The access rights of the user, the piece of equipment, and the temporary token currently associated with the equipment are combined to create an access control triplet. It is determined if the user is allowed to pass through an access control point based on the access control triplet.
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G07C 9/00 - Individual registration on entry or exit
G07C 9/10 - Movable barriers with registering means
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
7.
METHOD AND SYSTEM FOR CHECK-IN USING A CAMERA ASSIGNED FROM AMONGST A PLURALITY OF PRE-DEPLOYED CAMERAS
A method and system for check-in using a camera assigned from amongst a plurality of pre-deployed cameras is disclosed. The method includes identifying the plurality of pre-deployed security cameras within a geographic region that are potentially accessible to a person for a virtual appearance relating to individualized conditions imposed on the person under at least one legally enforceable order. The method also includes assigning one camera from the plurality of pre-deployed security cameras for access by the person during a defined time period which will begin at a point in time after the assigning of the camera.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
8.
Device and Method for Identifying Relationships Between Individuals in a Crowd
A process for identifying relationships between individuals in a crowd. In operating, an electronic computing device detects questions presented to a crowd with an instruction directing the crowd to answer each question in the form of non-verbal responses rather than in the form of verbal responses. The computing device enables at least one camera to record videos capturing activities of the crowd in response to each presented question. The activities of the crowd captured in the videos are analyzed using a video analytics engine to identify a pattern of non-verbal responses that would indicate a leader-follower relationship between individuals identified from the crowd. The electronic computing device then generates a visual and/or audio output identifying the leader-follower relationship between the individuals identified from the crowd.
A first mobile device receives actuation of a victim assistance button of an emergency assistance application associated with a first identifier of a first emergency profile associated with a first user of the first mobile device. The first mobile device receives, from a second mobile device, using a short-range communication interface, a second identifier of a second emergency profile associated with a second user of the second mobile device, the second identifier being encrypted and decryptable using a common decryption key associated with the emergency assistance application. The first mobile device decrypts the second identifier using the common decryption key, and provides, to an emergency service provider server, using a long-range communication interface, the second identifier that enables the emergency service provider server to retrieve the second emergency profile from a data storage module of an emergency information system at which the first and second emergency profiles are registered.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
10.
METHOD AND APPARATUS FOR MONITORING VERMIN WITHIN A GEOGRAPHIC AREA
A method and apparatus for creating a heat map of vermin within a geographic area is provided herein. During operation a camera (and/or other sensors) that are fixed and/or mobile are utilized to detect vermin. The camera and other sensors themselves may be equipped with the capabilities to detect vermin and report the detection of vermin and their location back to a server, or alternatively, a video feed of the camera and/or other sensors (and their locations) may be provided to the server for the server to attempt to detect vermin. Regardless of how vermin are detected in a particular area (e.g., via a sensor itself performing the detection, or via a server performing the detection via viewing a camera feed), the detected vermin are utilized to create a heat map of vermin for a particular area. The heat map may be provided to health authorities to aid in eradication of vermin.
Systems and methods for controlling use of a device having a plurality of operating features based on authentication of a user. The system includes an electronic processor communicatively coupled to an identification device. The electronic processor is configured to receive, from the identification device, a first characteristic of the user, and determine, based on the first characteristic of the user, whether the user is a primary user. The electronic processor is configured to determine, in response to failing to determine that the user is the primary user, a current operating pattern of the user, receive, in response to the user not being the primary user and from the identification device, a second characteristic of the user, and limit access to a subset of the plurality of operating features of the device based on the current operating pattern of the user and the second characteristic of the user.
Examples provide an emergency call center server including an electronic processor (32) configured to determine that an emergency service provider has received a call from a caller (24) regarding an incident, identify the caller (24) based on the received call, and access a user profile (48) associated with the caller (24) from a database (28). The user profile (48) includes a set of user data associated with the caller (24) and a set of contextual trigger conditions defining types and/or locations of incidents. Based on the received call, the electronic processor (32) determines satisfied ones of the set of contextual trigger conditions, selectively releases, to the emergency service provider, a first subset of user data that is associated with one or more satisfied contextual trigger conditions, and prevents release of a second subset of user data that is associated with one or more unsatisfied contextual trigger conditions.
Techniques for two factor authentication are provided. An access control point that is not connected to a network receives an encoded encrypted access credential that includes a biometric factor and an access token. The encoded encrypted access credential is decoded to extract a signed encrypted access credential. The signed encrypted access credential is decrypted at the access control point using a private key to create a signed decrypted access credential. The signed decrypted access credential is validated at the access control point. The biometric factor and the access token are extracted from the signed decrypted access credential. A user provided biometric factor is received. The user provided biometric factor is compared with the extracted biometric factor. Access via the access control point is provided when the comparing indicates the user provided biometric factor and the extracted biometric factor are the same and the access token indicates access should be allowed.
A method and system for employing video analytics in providing a situational awareness alert is disclosed. The method includes automatically detecting that a first person has entered a coverage area of a security camera. The method also includes automatically determining that the first person is registered in a monitoring service associated with the coverage area. The method also includes determining that a plurality of environmental and geospatial parameters associated with the coverage area satisfy a situational awareness threshold applicable to the first person. In response to the situational awareness threshold being satisfied, video analytics is employed to analyze video captured by security camera(s) to determine that there exists a second person having a respective Point Of View (POV) that permits staring observation of the first person by the second person.
A device, system and method to log a communication device into services using a device identifier is provided. An identity management (IM) computing device receives, from a certificate authority, a first digital certificate, and further receives from a given communication device, a second digital certificate and a device identifier associated with the given communication device. The IM computing device successfully validates the second digital certificate using the first digital certificate, obtains a user identifier associated with the device identifier, and issues, to the given communication device, one or more tokens that include the user identifier, the one or more tokens enabling the given communication device to log into one or more services using the user identifier.
G06F 9/451 - Execution arrangements for user interfaces
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
16.
DEVICE, METHOD AND SYSTEM FOR REDUCING NETWORK BANDWIDTH USAGE WHEN PROVIDING ALERTS
A device receives an indication of an incident associated with a given premises, the device having access to: network addresses associated with individuals associated with the given premises, and electronic roles and schedules of the individuals. The device classifies the individuals as recipients or nonrecipients of alerts for the incident based on the roles/schedules, and determines respective current activity classifications of the recipients and nonrecipients based on the roles/schedules. The device identifies, from the current activity classifications, respective relationship statuses between the recipients and nonrecipients, and generates at least one alert based on the respective relationship statuses, the at least one alert including instructions for a recipient to carry out relative to respective nonrecipients. The device transmits, over a network, the at least one alert to respective network addresses associated with the recipients, and refrains transmitting the at least one alert to the respective network addresses associated with the nonrecipients.
G06Q 10/109 - Time management, e.g. calendars, reminders, meetings or time accounting
G06Q 90/00 - Systems or methods specially adapted for administrative, commercial, financial, managerial or supervisory purposes, not involving significant data processing
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
17.
DEVICE, SYSTEM AND METHOD FOR MICROPHONIC NOISE COMPENSATION
A device, system, and method for microphonic noise compensation is provided. The device comprises: a speaker; a receiver; an audio processor configured to: process audio received via the receiver; and output processed audio to the speaker; a microphonic detection engine; and a microphonic compensation engine. The microphonic detection engine configured to: search for microphonic noise in the processed audio according to one or more predetermined microphonic parameters; and when the microphonic noise is detected: output a microphonic indicator to the microphonic compensation engine to cause the microphonic compensation engine to compensate for the microphonic noise in the audio. The microphonic compensation engine configured to: receive the microphonic indicator; and responsively compensate for the microphonic noise in the audio received via the receiver, prior to processing of the audio by the audio processor.
A method and system for tampering determination is disclosed. The method includes analyzing video captured by a body worn camera. The method also includes generating a tampering score for a video irregularity present in the video. The tampering score is generated based on inputting values of variables that correspond to a plurality of tamper determination factors into a formula. When the tampering score satisfies a threshold condition corresponding to deliberate tampering, flag (indicating that deliberate action of a person caused the video irregularity) is stored in non-volatile storage.
G06F 16/787 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
Examples provide an emergency call center server including an electronic processor configured to determine that an emergency service provider has received a call from a caller regarding an incident, identify the caller based on the received call, and access a user profile associated with the caller from a database. The user profile includes a set of user data associated with the caller and a set of contextual trigger conditions defining types and/or locations of incidents. Based on the received call, the electronic processor determines satisfied ones of the set of contextual trigger conditions, selectively releases, to the emergency service provider, a first subset of user data that is associated with one or more satisfied contextual trigger conditions, and prevents release of a second subset of user data that is associated with one or more unsatisfied contextual trigger conditions.
A device receives an indication of an incident associated with a given premises, the device having access to: network addresses associated with individuals associated with the given premises, and electronic roles and schedules of the individuals. The device classifies the individuals as recipients or nonrecipients of alerts for the incident based on the roles/schedules, and determines respective current activity classifications of the recipients and nonrecipients based on the roles/schedules. The device identifies, from the current activity classifications, respective relationship statuses between the recipients and nonrecipients, and generates at least one alert based on the respective relationship statuses, the at least one alert including instructions for a recipient to carry out relative to respective nonrecipients. The device transmits, over a network, the at least one alert to respective network addresses associated with the recipients, and refrains transmitting the at least one alert to the respective network addresses associated with the nonrecipients.
A camera system includes an electronic processor configured to generate a three-dimensional scene including static assets and dynamic assets. The static assets and the dynamic assets are representative of an environment and objects within a reference video. The reference video represents a first perspective. The electronic processor is configured to animate the dynamic assets based on motions of the objects within the reference video to generate an animated scene, render a test video based on the animated scene. The test video represents a second perspective. The electronic processor is configured to generate video analytics data of the test video, generate a comparison based on the video analytics data of the test video and video analytics data of the reference video, and transform a graphical user interface according to the comparison.
A device, method and system for detecting objects of interest using soundscaped signatures is provided. A device identifies, using first video or first audio from a first camera, an object of interest (OOI) and a sound type of a sound made by the OOI, and extracts a sound signature of the OOI from the first audio, using the sound type and a first soundscaping prediction model for a first environment of the first camera; generating a soundscaped signature of the OOI which predicts a modification of the sound signature in a second environment of a second camera, the soundscaped signature generated by inputting the sound signature and the sound type into a second soundscaping prediction model for the second environment. The device detects the soundscaped signature of the OOI in second audio from the second camera, and generates a notification that the OOI was detected at the second camera location.
G06V 20/40 - ScenesScene-specific elements in video content
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
H04R 3/04 - Circuits for transducers for correcting frequency response
23.
DEVICE, SYSTEM AND METHOD FOR MICROPHONIC NOISE COMPENSATION
A device, system, and method for microphonic noise compensation is provided. The device comprises: a speaker; a receiver; an audio processor configured to: process audio received via the receiver; and output processed audio to the speaker; a microphonic detection engine; and a microphonic compensation engine. The microphonic detection engine configured to: search for microphonic noise in the processed audio according to one or more predetermined microphonic parameters; and when the microphonic noise is detected: output a microphonic indicator to the microphonic compensation engine to cause the microphonic compensation engine to compensate for the microphonic noise in the audio. The microphonic compensation engine configured to: receive the microphonic indicator; and responsively compensate for the microphonic noise in the audio received via the receiver, prior to processing of the audio by the audio processor.
A connector application is provided. A trigger is received from a workflow server. The trigger includes an action ID. A public safety device is identified from a plurality of public safety devices based on agency private information. The identified public safety device is to perform an action in response to the trigger. No agency private information is shared with the workflow server. An indication is sent to the identified public safety device to execute the action.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 67/53 - Network services using third party service providers
Techniques for automatically modifying elevator workflow based on incident type are provided. An incident occurring within an elevator is detected via a video camera. Video analytics are used to determine the incident type. It is determined that a floor selection associated with the incident type will place elevator passengers or people on the selected floor at risk. Elevator workflow execution is automatically modified based on the incident type and risk associated with the floor selection. The floor selection is displayed while modifying the elevator workflow to a different floor. A security notification indicative of the incident type and the automatic modification of the elevator workflow is sent.
A system (100) includes non-transitory computer-readable media storing instructions and a processor configured to execute the instructions to receive a request for access to first media from a device. The first media is recorded by a first media-recording device (104) (104-1) (104-2) (104-3) and includes a portion identified as being associated with an event. The event is classified into an event category. The request for access includes an authorization certificate that includes a role. The processor is configured to execute the instructions to, in response to determining the authorization certificate is valid and the role is authorized to access the event category, provide the device access to the portion of the first media and transmit a token to the device. The token includes metadata (602) associated with the portion of the first media and is usable by the device to access a portion of second media. The second media is recorded by a second media-recording device (104) (104-1) (104-2) (104-3).
A system includes non-transitory computer-readable media storing instructions and a processor configured to execute the instructions to receive a request for access to first media from a device. The first media is recorded by a first media-recording device and includes a portion identified as being associated with an event. The event is classified into an event category. The request for access includes an authorization certificate that includes a role. The processor is configured to execute the instructions to, in response to determining the authorization certificate is valid and the role is authorized to access the event category, provide the device access to the portion of the first media and transmit a token to the device. The token includes metadata associated with the portion of the first media and is usable by the device to access a portion of second media. The second media is recorded by a second media-recording device.
A connector application is provided. A trigger is received from a workflow server. The trigger includes an action ID. A public safety device is identified from a plurality of public safety devices based on agency private information. The identified public safety device is to perform an action in response to the trigger. No agency private information is shared with the workflow server. An indication is sent to the identified public safety device to execute the action.
A portable communication device includes a main housing, and a knob coupled to the main housing. The knob is rotatable about a first axis that extends into the main housing, and the knob includes a channel that extends partially circumferentially about the first axis. The portable communication device also includes a button coupled to the main housing. The button is moveable linearly along a second axis that is parallel to the first axis, and the button includes a projection that is sized and shaped to extend into the channel. The button is movable between a first position in which the projection is within the channel, and a second position in which the projection is outside of the channel.
System, device and method are provided for inspection of electronic products. The method includes receiving, at a server electronic processor, x-ray image(s) associated with an electronic device. Image analytics are performed on the x-ray image(s) to identify a plurality of different fragmented signature portions disposed within the electronic device. The plurality of fragmented signature portions are collected, and a determination is made whether the collected fragments are combinable to form a complete signature based on pre-approved fragment images and fragment location stored in a memory of the server. The server generates a notification indicating: a valid, non-counterfeit product in response to determining a complete combined signature, with no missing fragment; a counterfeit component or counterfeit module in response to a missing fragment; and a counterfeit electronic product in response to a determination of all fragments missing.
A voice intercom system and method therefor are disclosed. The method includes wirelessly transmitting intercom directory data to a smartphone. The intercom directory data facilitates generation, on the smartphone, of an intercom access directory interface having a plurality of call initiation selection options, each with respect to which a call to a respective call recipient can be attempted.
H04L 61/4535 - Network directoriesName-to-address mapping using an address exchange platform which sets up a session between two nodes, e.g. rendezvous servers, session initiation protocols [SIP] registrars or H.323 gatekeepers
H04M 11/02 - Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
A method, system and computer program product for visual representation of an incident scene is disclosed. The method includes generating, using an at least one processor, a set of inputs for causing an at least one learning machine to create, for display on a screen, a visual representation of the incident scene corresponding to witness statements. The visual representation includes depictions of a plurality of scene elements. The method also includes providing the set of inputs to the at least one learning machine to cause the at least one learning machine to create the visual representation of the incident scene.
Examples provide a variable zoom imaging system including an image sensor (14), a set of illumination channels (18), and a current driver circuitry for driving the set of illumination channels (18). Each respective illumination channel includes a set of light sources and a lens, and is associated with a respective focus distance. An electronic processor (22) is configured to focus the image sensor (14) to an object of interest (46), determine a distance from the image sensor (14) to the object of interest (46), determine an exposure period for the image sensor (14), select a subset of illumination channels to activate based at least on the distance from the image sensor (14) to the object of interest (46), and capture a first image of the object of interest (46) using the image sensor (14) by sequentially activating and deactivating each selected illumination channel of the subset for first respective time frames within the exposure period.
H04N 23/56 - Cameras or camera modules comprising electronic image sensorsControl thereof provided with illuminating means
H04N 23/67 - Focus control based on electronic image sensor signals
H04N 23/741 - Circuitry for compensating brightness variation in the scene by increasing the dynamic range of the image compared to the dynamic range of the electronic image sensors
H04N 25/58 - Control of the dynamic range involving two or more exposures
35.
SYSTEMS AND METHODS FOR INSERTINGWATERMARKS IN RADAR SIGNALS FOR ELECTRONIC COUNTER-COUNTERMEASURES
Systems and methods for inserting watermarks in radar signals for electronic counter-countermeasures are provided. An example radar system generates a radar signal comprising a plurality of rising and falling edges and inserts a watermark into the radar signal by applying a time shift to a particular one of the rising and falling edges. The radar system then determines whether a received radar signal includes a time-shifted rising or falling edge corresponding to the inserted watermark and responsively determines whether the received radar signal is a skin return signal or an electronic countermeasure signal.
A system and computer-implemented method for responding to a potential or actual vehicle theft is disclosed. The system is installable within a parking facility that includes a fixed barrier structure around at least a portion of a perimeter of the parking facility to facilitate restriction of vehicle exit and entry to an at least one location where a respective at least one access-controlled gate or door is installed. The system also includes a camera that is configured to capture at least one image showing license plate characters of a license plate of a vehicle. A Field Of View (FOV) of the camera is arranged to include coverage of an area that is inside the parking facility and along a path leading to the at least one access-controlled gate or door.
Examples provide a variable zoom imaging system including an image sensor, a set of illumination channels, and a current driver circuitry for driving the set of illumination channels. Each respective illumination channel includes a set of light sources and a lens, and is associated with a respective focus distance. An electronic processor is configured to focus the image sensor to an object of interest, determine a distance from the image sensor to the object of interest, determine an exposure period for the image sensor, select a subset of illumination channels to activate based at least on the distance from the image sensor to the object of interest, and capture a first image of the object of interest using the image sensor by sequentially activating and deactivating each selected illumination channel of the subset for first respective time frames within the exposure period.
Techniques for reconfiguring a second camera based on a first camera are provided. An event of interest is identified at a first camera using a first analytic. The event of interest occurring in a portion of a field of view of the first camera. A second camera whose field of view includes at least a portion of the event of interest in a field of view of the second camera is identified. It is determined that the second camera is equipped with a second analytic, the second analytic not currently operating on the at least a portion of the event of interest in the field of view of the second camera. The second camera is reconfigured to perform the second analytic on the at least the portion of the event of interest in the field of view of the second camera.
A method, system and computer program product for visual representation of an incident scene is disclosed. The method includes generating, using an at least one processor, a set of inputs for causing an at least one learning machine to create, for display on a screen, a visual representation of the incident scene corresponding to witness statements. The visual representation includes depictions of a plurality of scene elements. The method also includes providing the set of inputs to the at least one learning machine to cause the at least one learning machine to create the visual representation of the incident scene.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Radio communications; Transmission and delivery of telecommunication services, namely, providing voice, text, data, pictures, music and video via wireless networks and two-way radio dispatching services Two-way radios; Gateway routers; Downloadable software for enabling mobile phones with push to talk capability Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; Software as a service (SAAS) services featuring software for connecting people and devices with push-to-talk communications
Techniques for executing additional analytics at an access control point are provided. A target at an access control point attempting to traverse the access control point is identified. The target is provided an indication that traversal of the access control point is delayed. Additional analytics resources are directed to the access control point. Additional analytics are run on the target using the additional analytics resources. The target is allowed to traverse the access control point once the additional analytics have completed.
Techniques for executing additional analytics at an access control point are provided. A target at an access control point attempting to traverse the access control point is identified. The target is provided an indication that traversal of the access control point is delayed. Additional analytics resources are directed to the access control point. Additional analytics are run on the target using the additional analytics resources. The target is allowed to traverse the access control point once the additional analytics have completed.
A communication system, method and device are provided for managing a post-incident response. The system includes a security system controller having a processor configured to receive a notification that a mass incident event, such as an active shooter event, has ended and send a prompt requesting in-room victim status information to a plurality of in-room communication device of the building. Analytics are performed by the processor on the received in-room victim status information to determine room priority. A post-incident workflow is triggered that generates a plurality of control signals indicative of each room priority and in-room victim status for each room. The plurality of control signals are sent to chirp generators of door access control devices associated with each room of the building. Each control signal controls chirp playout indicative of the room priority and victim status. A mutual aid responder, without access to a radio, can follow the audible chirps.
G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G08B 21/22 - Status alarms responsive to presence or absence of persons
45.
DEVICE, SYSTEM, AND METHOD FOR CONTROLLING VEHICLE-RELATED FUNCTIONALITY
A device, system, and method for controlling vehicle-related functionality is provided. A system comprises: a vehicle comprising: a vehicle display; a mobile device comprising: a mobile display, the vehicle and the mobile device communicatively coupled to each other; a transceiver; and a controller. The controller is configured to: determine, via the transceiver, whether the vehicle is a first vehicle or a subsequent vehicle to arrive at an incident scene. When the vehicle is the first vehicle to arrive at the incident scene, the controller selectively enables: a first application for presentation at the vehicle display; and a second application for presentation at the mobile display. When the vehicle is the subsequent vehicle to arrive at the incident scene, the controller selectively enables: a third application, different from the first application, for presentation at the vehicle display; and a fourth application for presentation at the mobile display.
G08G 1/0965 - Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages responding to signals from another vehicle, e.g. emergency vehicle
B60K 35/00 - Instruments specially adapted for vehiclesArrangement of instruments in or on vehicles
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
46.
DEVICE, SYSTEM, AND METHOD FOR CONTROLLING A VEHICLE-RELATED DISPLAY INTO AN EXITED OCCUPANT SUPPORT MODE
A device, system, and method for controlling a vehicle-related display into an exited occupant support mode is provided. A system comprises: a vehicle egress sensor; a first vehicle comprising: a vehicle display; a mobile device comprising: a mobile display, the first vehicle and the mobile device communicatively coupled to each other; and a controller. The controller is configured to: determine, via the vehicle egress sensor, that an occupant has exited the first vehicle, or a second vehicle proximal to the first vehicle; and in response, selectively enable an exited occupant support mode at one or more of the vehicle display and the mobile display.
A computer-implemented method of generating a trigger initiating an emergency incident response workflow and a device implementing the method is disclosed. Emergency notification data associated with at least one emergency notification reporting a first incident is received. Based on the emergency notification data, a first sensor data originating from one or more sensors is retrieved, the first sensor data associated with a time and location of the first incident. At least one alarm-escalating trigger is generated. The alarm escalating trigger comprises an alarm-escalating condition and a first-type emergency incident response workflow, the alarm-escalating condition being based on at least a portion of the first sensor data. The alarm-escalating trigger, when implemented by an implementing device, triggers the first-type emergency incident response workflow in response to receiving a second sensor data originating from one or more implementing sensors, the second sensor data meeting the alarm-escalating condition.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
48.
METHOD OF GENERATING A TRIGGER INITIATING AN EMERGENCY INCIDENT RESPONSE WORKFLOW
A computer-implemented method of generating a trigger initiating an emergency incident response workflow and a device implementing the method is disclosed. Emergency notification data associated with at least one emergency notification reporting a first incident is received. Based on the emergency notification data, a first sensor data originating from one or more sensors is retrieved, the first sensor data associated with a time and location of the first incident. At least one alarm-escalating trigger is generated. The alarm escalating trigger comprises an alarm-escalating condition and a first-type emergency incident response workflow, the alarm-escalating condition being based on at least a portion of the first sensor data. The alarm-escalating trigger, when implemented by an implementing device, triggers the first-type emergency incident response workflow in response to receiving a second sensor data originating from one or more implementing sensors, the second sensor data meeting the alarm-escalating condition.
A device, system and method to control operation of a base station is provided. A computing devices communicates, to two or more spectrum controllers, respective authorization requests associated with a physical base station at a given location, the two or more spectrum controllers managed by different respective entities. The computing device receives, from the two or more spectrum controllers, one or more respective spectrum controller responses to the respective authorization requests. When the one or more respective spectrum controller responses include at least one authorization associated with the physical base station, the computing device provides, to the physical base station, permission to operate via respective RF transmissions.
A method and system for carrying out iterative appearance searching is disclosed. The method includes employing at least one first reference image to carry out a first instance, computer vision-driven appearance search of first video data captured across a respective first set of a plurality of first security cameras. The method also includes obtaining a second reference image, having a respective relevance confidence that satisfies a confidence threshold condition, from the portion of the first video data. The method also includes employing the second reference image for a second instance, computer vision-driven appearance search of second video data captured across a respective second set of a plurality of second security cameras.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 20/40 - ScenesScene-specific elements in video content
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
51.
DIFFERENTIAL CONFIGURATION UPDATES FOR MOBILE DEVICES
A system includes memory hardware configured to store instructions and processing hardware configured to execute the instructions. The instructions include loading a legacy configuration file including a plurality of legacy blocks and loading an updated configuration file including a plurality of updated blocks. The instructions include, for each updated block, identifying one legacy block from the plurality of legacy blocks having a same type as the updated block and a payload representing a nearest match to a payload of the updated block and generating an update data object based on an identifier of the legacy block and an identifier of the updated block and adding the update data object to a difference file in response to the identified one legacy block and the updated block having matching payloads but different identifiers. The instructions include transmitting the difference file to a mobile device via a radio network to update the device.
A method and system for carrying out iterative appearance searching is disclosed. The method includes employing at least one first reference image to carry out a first instance, computer vision-driven appearance search of first video data captured across a respective first set of a plurality of first security cameras. The method also includes obtaining a second reference image, having a respective relevance confidence that satisfies a confidence threshold condition, from the portion of the first video data. The method also includes employing the second reference image for a second instance, computer vision-driven appearance search of second video data captured across a respective second set of a plurality of second security cameras.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads
53.
SYSTEM AND METHOD FOR SELECTING A GENERATED IMAGE THAT IS REPRESENTATIVE OF AN INCIDENT
Techniques for selecting a generated image that is representative of an incident are provided. An initial summary of an incident is generated using an artificial intelligence processing tool. At least two images based on the initial summary are generated using an artificial intelligence image generation tool. For each of the at least two images, a subsequent summary is generated using an artificial intelligence image to text generation tool. The initial summary is compared to each of the subsequent summaries. The generated image associated with the subsequent summary that is most similar to the initial summary is selected as representative of the incident.
Techniques for selecting a generated image that is representative of an incident are provided. An initial summary of an incident is generated using an artificial intelligence processing tool. At least two images based on the initial summary are generated using an artificial intelligence image generation tool. For each of the at least two images, a subsequent summary is generated using an artificial intelligence image to text generation tool. The initial summary is compared to each of the subsequent summaries. The generated image associated with the subsequent summary that is most similar to the initial summary is selected as representative of the incident.
A method and system for controlled absence of moving objects from the field of view of a camera during a defined time period is disclosed. When data generated by an at least one electronics device or a respective controller thereof confirms that the physical environment requirements of the at least one electronics device will be met, or confirms that the at least one electronics device will be controlled to meet the operational requirements, the video camera is allowed to enter a mode where the capturing of the video is impeded during the time period. Conversely, when the data indicates that the physical environment requirements will not be met, or that the at least one electronics device will not be controlled to meet the operational requirements, the system ensures that the capturing of the video is not impeded during the time period.
Techniques for adjusting audio attributes for off-focus audio of a device are provided. An indication that audio attributes for on-focus audio are being adjusted are received at the device. The indication is received via an audio control of the device. A priority level of an application having the on-focus audio is determined. An event based on the priority level is determined. The audio attributes for on-focus audio are adjusted. The audio attributes for off-focus audio are adjusted upon occurrence of the event.
Systems and methods for virtual assistant based cargo inspection. The method includes automatically inspecting a subset of cargo using a first recorded video associated with the cargo and generating a second recorded video by annotating the first recorded video including annotations for a second subset of the cargo identified for manual inspection. The method also includes accessing, using a portable communications device, a virtual assistant feature of the portable communications device. In response to receiving one or more prompts via the virtual assistant feature, the method includes receiving the second recorded video and generating an interactive display for displaying the second recorded video. In response to receiving one or more prompts via the virtual assistant feature, the method also includes detecting an interaction with the annotations of the second recorded video and providing, using the virtual assistant feature, a recommendation corresponding to the interaction via a human machine interface.
A system includes an in-vehicle assistant (IVA) platform and a mobile communication device. The IVA platform includes a first electronic processor, a first display, and a first communications interface. The mobile communication device includes a second electronic processor, a second display, and a second communications interface. At least one of the first electronic processor or the second electronic processor is configured to access a user profile, parse the user profile to identify a set of applications authorized for use by the user profile, the set of applications including a first application and a second application, generate and render a first graphical user interface (GUI) on the first display, generate and render a second GUI on the second display, render the first application on the first GUI and not on the second GUI, and render the second application on the second GUI and not on the first GUI.
A device, system and method to control network load at a base station is provided. A computing device determines a network loading level on a given sector of a base station, the base station in communication with wireless cameras categorized according to rank. When the network loading level exceeds a first threshold, the computing device adjusts a respective scene classification threshold of a lowest rank group of the cameras to a value that decreases a likelihood of scenes of the lowest rank group of the cameras being classified at a higher scene interest level. The scenes classified according to the higher level are streamed by the cameras at a quality higher than other scenes classified to a lower scene interest level, thereby controlling the cameras of the lowest rank, that generate respective scenes according to the lower level, to lower their respective network loading on the given sector.
A device, system and method to control network load at a base station is provided. A computing device determines a network loading level on a given sector of a base station, the base station in communication with wireless cameras categorized according to rank. When the network loading level exceeds a first threshold, the computing device adjusts a respective scene classification threshold of a lowest rank group of the cameras to a value that decreases a likelihood of scenes of the lowest rank group of the cameras being classified at a higher scene interest level. The scenes classified according to the higher level are streamed by the cameras at a quality higher than other scenes classified to a lower scene interest level, thereby controlling the cameras of the lowest rank, that generate respective scenes according to the lower level, to lower their respective network loading on the given sector.
Examples provide an imaging system including an image sensor; and an electronic processor in communication with the image sensor. The electronic processor is configured to determine a set of imaging parameters, and, for each iteration included in an iteration set, update the set of imaging parameters by: receiving an image captured by the image sensor using the set of imaging parameters, performing object recognition on the image to detect an object of interest, determining an object recognition confidence score, determining a set of external factors based on the image and/or information from a second sensor, linking the set of imaging parameters and the set of external factors to the object recognition confidence score, and training a predictive model for updating the set of imaging parameters using the object recognition confidence score, the set of imaging parameters, and the set of external factors.
Techniques for reducing resources used for uploading a video to be indexed for searching at a cloud search service are provided. A file containing the video is received at an on premise client application. The application processes the file with an event detector to detect at least one event of interest based on a first set of event detection criteria. The at least one event of interest is sent to the cloud searching service. The cloud searching service classifies at least one object in the at least one event of interest. The cloud searching service identifies a second set of event identification criteria based on the classification. The cloud searching service sends feedback to the application for event detection and sending events based on the second set of event identifying criteria. The application modifies the first event detection criteria based on the feedback to create new event detection criteria.
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
An imaging system including an image sensor (14); and an electronic processor (18) in communication with the image sensor (14). The electronic processor (18) is configured to determine a set of imaging parameters (30), and, for each iteration included in an iteration set, update the set of imaging parameters (30) by: receiving an image captured by the image sensor (14) using the set of imaging parameters (30), performing object recognition to detect an object of interest, determining an object recognition confidence score, determining a set of external factors based on the image and/or information from a second sensor, linking the set of imaging parameters (30) and the set of external factors to the object recognition confidence score, and training a predictive model (34) for updating the set of imaging parameters (30) using the object recognition confidence score, the set of imaging parameters (30), and the set of external factors.
A device, system and method to log a communication device into services using a device identifier is provided. An identity management (IM) computing device receives, from a certificate authority, a first digital certificate, and further receives from a given communication device, a second digital certificate and a device identifier associated with the given communication device. The IM computing device successfully validates the second digital certificate using the first digital certificate, obtains a user identifier associated with the device identifier, and issues, to the given communication device, one or more tokens that include the user identifier, the one or more tokens enabling the given communication device to log into one or more services using the user identifier.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The present invention relates to a mounting apparatus and a holster having a bracket with a D-stud with a radial pattern of detent pockets. The D-stud allows the bracket to rotate in a ratcheting manner in a first range of motion and freely rotate in a second range of motion. The free rotation of the second range of motion allows the D-stud to automatically recover from a vertical position to a non-vertical position.
A method and system for analytics selection based on pursuit-context details is disclosed. The method includes tracking a pursuer object and a pursued object, and using analytics on video or image data corresponding to the pursuer object and/or the pursued object to determine at least one pursuit-context detail. The pursuit-context detail(s) are matched to a select one of a plurality of object behavior-targeted analytics.
Examples provide an imaging system including an electronic processor configured to obtain video data of a scene including a region of interest including a plurality of frames, determine a total number of detected humans in the region of interest of a current frame of the plurality of frames, determine a number of running humans in the region of interest of the current frame, and determine a probability associated with the number of running humans in the region of interest of the current frame and the total number of detected humans in the region of interest of the current frame based on accumulated statistics for the region of interest. In response to determining that the probability is less than a threshold probability, the electronic processor generates an alert indicating a stampede is detected in the region of interest.
Techniques for reducing resources used for uploading a video to be indexed for searching at a cloud search service are provided. A file containing the video is received at an on premise client application. The application processes the file with an event detector to detect at least one event of interest based on a first set of event detection criteria. The at least one event of interest is sent to the cloud searching service. The cloud searching service classifies at least one object in the at least one event of interest. The cloud searching service identifies a second set of event identification criteria based on the classification. The cloud searching service sends feedback to the application for event detection and sending events based on the second set of event identifying criteria. The application modifies the first event detection criteria based on the feedback to create new event detection criteria.
Devices, systems, and methods for automatically captioning images using swipe gestures as inputs. One example apparatus includes an electronic processor. The electronic processor is configured to receive an image. The electronic processor is configured to control a display to display the image. The electronic processor is configured to detect a first object in the image. The electronic processor is configured to detect a second object in the image. The electronic processor is configured to receive, from the display, a first swipe gesture. The electronic processor is configured to, responsive to receiving the first swipe gesture, determine a direction of the first swipe gesture relative to the first object and the second object. The electronic processor is configured to determine a word choice based on the first direction. The electronic processor is configured to generate a caption describing the image based on the word choice.
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
A device, system and method to initiate a communication between communication devices based on audio input is provided. A computing device converts audio input from a first communication device into phonetic data corresponding to a target name from the audio input, and selects, using a machine learning algorithm, from names that potentially match the target name, a particular name as a match, using as input to the algorithm: the phonetic data; and non-phonetic data associated with one or more of the audio input, and at least one of the names. The computing device: initiates a communication between the first communication device, and a second communication device associated with the particular name; receives, from one or more of the first and second communication devices, feedback indicating whether the match of the particular name and the target name is positive or negative; and trains the machine learning algorithms using the feedback.
G10L 17/14 - Use of phonemic categorisation or speech recognition prior to speaker recognition or verification
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
G10L 17/02 - Preprocessing operations, e.g. segment selectionPattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal componentsFeature selection or extraction
G10L 17/04 - Training, enrolment or model building
G10L 17/10 - Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
71.
DEVICE, SYSTEM, AND METHOD TO INITIATE A COMMUNICATION BETWEEN COMMUNICATION DEVICES BASED ON AUDIO INPUT
A device, system and method to initiate a communication between communication devices based on audio input is provided. A computing device converts audio input from a first communication device into phonetic data corresponding to a target name from the audio input, and selects, using a machine learning algorithm, from names that potentially match the target name, a particular name as a match, using as input to the algorithm: the phonetic data; and non-phonetic data associated with one or more of the audio input, and at least one of the names. The computing device: initiates a communication between the first communication device, and a second communication device associated with the particular name; receives, from one or more of the first and second communication devices, feedback indicating whether the match of the particular name and the target name is positive or negative; and trains the machine learning algorithms using the feedback.
Techniques for resetting a primary communications channel of a drone based on a new connection parameter received over a secondary communications channel are provided. It is detected that a drone is suspected of being hijacked. A primary communications channel to the drone that is used for flight operations is disabled. A secondary communications channel that is less suitable for flight control operations is established. At least one new connection parameter for the primary communications channel is received over the secondary communications channel. The primary communications channel is reset based on the at least one new connection parameter.
A surface mountable camera (1000) includes a junction box (104) and clip (300) that provide for a plurality of selectable mounting positions, each accommodating a hanging camera position. The junction box (104) provides a four-sided interior compartment, wherein at least three side walls of the compartment each include a slot (112) and an anchor feature (114) corresponding to the slot. The clip (300) is configured to interchangeably insert onto any of the three side walls of the junction box. The clip (300) includes an access port (304) formed therein for engaging with the anchor feature (114) of the junction box (104), and the clip includes first and second engagement tabs (302) for engaging into the slot (112) of the junction box (104). Once the clip (300) is anchored to the junction box (104), a camera assembly (200) is pivotably mounted, via a hinged bracket (400), to the clip of the junction box.
A surface mountable camera (1000) includes a junction box (104) and clip (300) that provide for a plurality of selectable mounting positions, each accommodating a hanging camera position. The junction box (104) provides a four-sided interior compartment, wherein at least three side walls of the compartment each include a slot (112) and an anchor feature (114) corresponding to the slot. The clip (300) is configured to interchangeably insert onto any of the three side walls of the junction box. The clip (300) includes an access port (304) formed therein for engaging with the anchor feature (114) of the junction box (104), and the clip includes first and second engagement tabs (302) for engaging into the slot (112) of the junction box (104). Once the clip (300) is anchored to the junction box (104), a camera assembly (200) is pivotably mounted, via a hinged bracket (400), to the clip of the junction box.
A voice intercom system and method therefor are disclosed. The method includes wirelessly transmitting intercom directory data to a smartphone. The intercom directory data facilitates generation, on the smartphone, of an intercom access directory interface having a plurality of call initiation selection options, each with respect to which a call to a respective call recipient can be attempted.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
H04L 61/4594 - Address books, i.e. directories containing contact information about correspondents
H04M 19/04 - Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
76.
SECURITY ECOSYSTEM, DEVICE AND METHOD FOR CONTROLLING WORKFLOWS ASSOCIATED WITH DIFFERENT ENTITIES BASED ON EXPORT AND IMPORT RULES
A security ecosystem, device and method for controlling workflows associated with different entities based on export and import rules is provided. For example, a computing device monitors execution of a first safety workflow, associated with a first entity, comprising a first trigger and a first responsive action. The computing device compares an event, associated with the first trigger, with an export rule. In response to the event of the first safety workflow meeting the export rule, the computing device compares the event with an import rule, associated with a second entity, for initiating a second safety workflow based on the event and associated with the second entity. In response to the event meeting the import rule, the computing device initiates the second safety workflow associated with the second entity, the second safety workflow comprising a second trigger and a second responsive action, the second trigger corresponding to the event.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A voice intercom system and method therefor are disclosed. The method includes wirelessly transmitting intercom directory data to a smartphone. The intercom directory data facilitates generation, on the smartphone, of an intercom access directory interface having a plurality of call initiation selection options, each with respect to which a call to a respective call recipient can be attempted.
A method and apparatus for volume control of an electronic device is provided herein. During operation, a volume-control knob will increase a volume of sound output from a device in a substantially linear fashion (versus knob rotation angle) as a volume-control knob is rotated. Once the volume-control knob is rotated past a predetermined amount, a volume boost is activated, increasing the volume level in a non-linear fashion. More particularly, in one embodiment of the present invention, once the volume-control knob is rotated past the predetermined amount (e.g., 300 degrees), the volume will be increased instantaneously (e.g., by 25%).
G10L 21/0216 - Noise filtering characterised by the method used for estimating noise
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
One example device may be configured to determine that a destination public safety answering point (PSAP) of a received first call operates in a legacy PSAP domain. In response such a determination, the device may determine whether the first call is of a first type of call that includes an original number identification or of a second type of call that does not include an original number identification. In response to determining that the first call is of the first type, the device may deliver the first call to the destination PSAP along with an original number identification of the first call. In response to determining that the first call is of the second type, the device may generate a crafted number identification for the first call, and deliver the first call to the destination PSAP along with the crafted number identification.
A method and apparatus for volume control of an electronic device is provided herein. During operation, a volume-control knob will increase a volume of sound output from a device in a substantially linear fashion (versus knob rotation angle) as a volumecontrol knob is rotated. Once the volume-control knob is rotated past a predetermined amount, a volume boost is activated, increasing the volume level in a non-linear fashion. More particularly, in one embodiment of the present invention, once the volume-control knob is rotated past the predetermined amount (e.g., 300 degrees), the volume will be increased instantaneously (e.g., by 25%).
A method and apparatus for performing noise suppression on an electronic device is provided herein. During operation, a volume-control knob will increase a volume of sound output from a device in a substantially linear fashion (versus knob rotation angle) as a volume-control knob is rotated in a first direction. Noise suppression on the electronic device will also increase as the volume-control knob is rotated in the first direction.
G01B 7/30 - Measuring arrangements characterised by the use of electric or magnetic techniques for measuring angles or tapersMeasuring arrangements characterised by the use of electric or magnetic techniques for testing the alignment of axes
G05G 1/10 - Details, e.g. of discs, knobs, wheels or handles
Examples provide a video security system including an electronic processor configured to detect an anomaly by obtaining video data captured using an image sensor and determining a number of people detected in each of a plurality of frames of the video data. For each moment t, the electronic processor determines an average number of people n over a time interval (t-Δt1, t), where Δt1 is greater than or equal to the moment t. For each non-overlapping time interval Δt1, the electronic processor updates a histogram based on the average number of people for the time interval Δt1. In response to determining, using the histogram, that the probability ρ of the average number of people n over the time interval (t-Δt1, t) is less than a threshold probability ρ*, the electronic processor generates an alert indicating that an anomalous crowd size is detected.
Examples provide a video security system including an electronic processor configured to detect an anomaly by obtaining video data captured using an image sensor and determining a number of people detected in each of a plurality of frames of the video data. For each moment t, the electronic processor determines an average number of people n over a time interval (t−Δt1, t), where Δt1 is greater than or equal to the moment t. For each non-overlapping time interval Δt1, the electronic processor updates a histogram based on the average number of people for the time interval Δt1. In response to determining, using the histogram, that the probability ρ of the average number of people n over the time interval (t−Δt1, t) is less than a threshold probability ρ*, the electronic processor generates an alert indicating that an anomalous crowd size is detected.
G06V 10/34 - Smoothing or thinning of the patternMorphological operationsSkeletonisation
G06V 10/50 - Extraction of image or video features by performing operations within image blocksExtraction of image or video features by using histograms, e.g. histogram of oriented gradients [HoG]Extraction of image or video features by summing image-intensity valuesProjection analysis
G06V 20/40 - ScenesScene-specific elements in video content
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
Systems and method for camera calibration. In one example, the camera includes an electronic processor configured to obtain a bounding box in a captured image, the bounding box bounding a person in the image and having a lowermost vertical coordinate and an uppermost vertical coordinate. The electronic processor determines an initial estimation of values of a set of camera parameters Θ and a current estimation of values of the set of camera parameters Θ based on the initial estimation. The electronic processor iteratively updates the current estimation of values of the set of camera parameters Θ by determining feet coordinates within the bounding box, determining a vertical head coordinate, and updating the current estimation of values of the set of camera parameters Θ by reducing a difference between the vertical head coordinate and the uppermost vertical coordinate of the bounding box.
Examples provide a cloud server management controller configured to determine a network resource threshold and a cloud resource availability for a cloud server. The first resource availability is an amount of cloud network resources available in the cloud server within the network resource threshold. For each respective system of a plurality of local network systems, the controller determines a local resource usage and predicts a cloud resource requirement. The cloud resource requirement is an amount of cloud network resources required to provide a cloud-based equivalent of the respective system. The controller builds a model based on the cloud resource requirement for each respective system and the network resource threshold. The model defines a cloud migration priority for each of the plurality of local network systems. Based on the model, the controller generates a cloud migration timeline for sequentially migrating each respective system to the cloud server.
A method and apparatus for providing discovery within a D2D communications is provided herein. During operation, a first device will determine an identification of its own network slice, and an identification of a network slice other devices operate on. Only devices operating on the same network slice as the first device are allowed for D2D communication with the first device.
A method, system and computer program product for diagnosing a malfunctioning or misused electronic device is disclosed. The method includes performing analytics on at least one of video and audio to automatically detect at least one anomaly exhibited by the electronic device or exhibited in relation to user interaction with the electronic device, the at least one anomaly being distinguishable from other non-present anomalies detectable by a computer system that carries out the performing of the analytics.
A process for alerting a user for capturing digital evidence that is not in compliance with evidentiary policies. In operation, an electronic computing device acquires audio and/or video recordings from audio and/or video recorders operated by a user while the user is performing an assigned task. The device retrieves an evidentiary policy established corresponding to a particular type of the assigned task. The evidentiary policy identifies a list of evidentiary objects required to be digitally recorded in the audio and/or video recordings captured corresponding to the user's assigned task. If the audio and/or video recordings do not record at least one evidentiary object identified in the evidentiary policy with a specified quality level, then the device provides an electronic alert to the user indicating that the audio and/or video recordings are not in compliance with the evidentiary policy.
Device, system and method to control at least one electrical circuit to enter a low efficiency mode to heat a battery cell is provided. A temperature measurement device and battery cell parameter determination device respectively determine a temperature and impedance of a battery cell of a device. When the temperature of the battery cell is below a threshold temperature and the impedance of the battery cell is above a threshold impedance, a controller of the device controls at an electrical circuit of the device to enter a low efficiency mode by controlling the electrical circuit to draw an auxiliary current from the battery cell to heat the battery cell, the auxiliary current being below a given functional operating current of the electrical circuit, the electrical circuit having reduced functionality, relative to a given functionality when drawing a given functional operating current from the battery cell, while drawing the auxiliary current.
H01M 10/48 - Accumulators combined with arrangements for measuring, testing or indicating the condition of cells, e.g. the level or density of the electrolyte
90.
SECURITY ECOSYSTEM, DEVICE AND METHOD FOR COMMUNICATING WITH COMMUNICATION DEVICES BASED ON WORKFLOW INTERACTIONS
A device monitors execution of a safety workflow, the safety workflow comprising one or more triggers and one or more responsive actions. The device provides, at a display screen, an indication of the safety workflow and respective visual indications of: a physical sensor that generated sensor data of a trigger of the safety workflow; and a communication device associated with a responsive action to the trigger. The device detects, via an input device, an interaction with one or more of the respective visual indications to interact with one or more of the physical sensor and the communication device. Based on the interaction, the device one or more of: initiates communication with the communication device; and sends the sensor data to the communication device.
A process for redacting an image. In operation, an electronic computing device receives an image captured by a camera corresponding to a field of view of the camera. The image contains a plurality of pixels and each pixel in the plurality of pixels capturing a respective region in a plurality of regions of the field of view of the camera. The electronic computing device measures a distance from the camera to each respective region in the plurality of regions of the field of view of the camera. The electronic computing device redacts at least one pixel in the plurality of pixels contained in the image as a function of the distance measured from the camera to a respective region captured in the at least one pixel.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A process for redacting an image. In operation, an electronic computing device receives an image captured by a camera corresponding to a field of view of the camera. The image contains a plurality of pixels and each pixel in the plurality of pixels capturing a respective region in a plurality of regions of the field of view of the camera. The electronic computing device measures a distance from the camera to each respective region in the plurality of regions of the field of view of the camera. The electronic computing device redacts at least one pixel in the plurality of pixels contained in the image as a function of the distance measured from the camera to a respective region captured in the at least one pixel.
A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.
A method and apparatus for minimizing a time that a camera field of view is not being monitored while the camera is undergoing a software or firmware update is provided herein. During operation a determination is made that a camera needs a software or firmware update. The location of a security asset (e.g., a mobile camera, a security guard, a drone, . . . , etc.) is determined. The update is performed based on the security asset being within a predetermined distance from the camera. More particularly, in one embodiment, the update is performed only when the security asset is within the predetermined distance from the camera.
A system for low earth orbit (LEO) satellite communication. In one example, the system includes a control computer and a workgroup including a plurality of communication devices. Each communication device includes an electronic processor configured to establish a wireless network connection with the control computer, determine connectivity data associated with a signal between the communication device and a first LEO satellite (121), and transmit the connectivity data to the control computer via the wireless network connection. The control computer is configured to receive the connectivity data from each communication device, and select a first one of the plurality of communication devices as a primary communication device (201) based on each of the connectivity data. The primary communication device (201) is configured to receive media from a different one of the plurality of communication devices via the wireless network connection and transmit the media to the first LEO satellite (121).
A method and apparatus for providing recommendations for evidence collection is provided herein. During operation a recommendation server is provided with evidence collected, including IoT device logs of events that can be used as evidence to investigate a particular crime. In response, the recommendation server will provide the investigator recommendations to search for additional evidence of events and objects that could potentially be used in a successful prosecution of the crime. The recommendations provided will be based on events that were used as evidence in past successful prosecutions of similar crimes.
A system and method for gradual migration from a legacy application to a replacement application is disclosed. The method includes determining whether or not a feature requested by a user is available amongst installed features currently deliverable by a replacement software application. When the feature requested by the user is currently deliverable by the replacement software application, a legacy software application communicates with the replacement software application to cause the feature requested by the user to be obtained from the replacement software application.
A process of selectively enabling execution of video analytics on videos captured by cameras. In operation, an electronic computing device accesses an incident database identifying incidents resolved by one or more agencies. The incidents include a first set of incidents that were first reported to the agencies by a human source and a second set of incidents that were first reported to the agencies by a video analytics system. The electronic computing device then estimates a first average cost incurred in resolving the first set of incidents and a second average cost incurred in resolving the second set of incidents. The electronic computing device enables the video analytics system to execute video analytics on videos captured by the one or more cameras to proactively detect and report incidents when the first average cost is higher than the second average cost by at least the predefined threshold.
A method, system and computer program product for backup assignment of a mobile electronics device is disclosed. In response to one or more device assignment requests received by a controller apparatus when a server is operating in an off-line mode, one or more device assignment records are created within the controller apparatus, and which indicate assignment of the at least one mobile electronics device to a respective one or more users. When the server is operating in an off-line mode such that communication between the controller apparatus and the server is off-line, the one or more device assignment records, in relation to the at least one mobile electronics device, are stored in the controller apparatus. In response to the server re-entering the on-line mode, the server is updated with the one or more device assignment records.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 67/2869 - Terminals specially adapted for communication
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
100.
DEVICE, SYSTEM, AND METHOD TO PROVIDE FRONT-FACING CAMERA IMAGES IDENTIFIED USING A SCENE IMAGE ASSEMBLED FROM REAR-FACING CAMERA IMAGES
A device, system, and method to provide front-facing camera images identified using a scene image assembled from rear-facing camera images is provided. A device retrieves dual-sensor camera images having respective metadata indicating image acquisitions substantially matching a time and a place associated with an incident, the dual-sensor camera images including a front and rear-facing camera image acquired via a same respective dual-sensor camera. The device assembles the rear-facing camera images into a scene image and renders the scene image at a display screen. The device receives an indication of a region-of-interest within the scene image and responsively: identifies a set of rear-facing camera images acquired within a predetermined threshold distance of the region-of-interest as determined using the respective metadata; and renders, at the display screen, front-facing camera images, from the dual-sensor camera images, associated with the set of rear-facing camera images acquired within the predetermined threshold distance of the region-of-interest.