Abstract: A security system includes sensor devices, a security panel that receives signals from the sensor devices and that executes algorithms to determine the presence of an alarm that is sent to a game console coupled to a monitor. The game console includes a processor and memory, a graphics processor, and a network interface that receives data from the security panel and causes a message regarding the alarm condition to be displayed on the monitor.
Type:
Application
Filed:
September 25, 2014
Publication date:
March 31, 2016
Applicant:
Sensormatic Electronics, LLC
Inventors:
Amit Kumar Sharma, Yatishkumar Ravinath Pokale, B. Parthasarathy
Abstract: A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security system component is received. Data from at least one sensor is received. A computing device is used to analyze the analytic alarm and the data from the at least one sensor to determine whether tampering of the security system component has occurred. A qualified alarm signal is generated when the analysis of the analytic alarm and the data from the at least one sensor is indicative of tampering.
Type:
Grant
Filed:
September 5, 2013
Date of Patent:
March 15, 2016
Assignee:
Sensormatic Electronics, LLC
Inventors:
Walter Andrew Martin, Martin Joseph Donaghy
Abstract: In a security camera system, the power to the illumination system is controlled based on the quality of the images generated by the imaging system. Specifically, the images in the frames detected by the imaging chip of the security camera are analyzed to determine whether or not there is adequate or inadequate power to the illumination system. The controller then changes the power to the illumination system until optimal illumination of the scene is achieved. Generally the power to the illumination system is reduced in response to increasing blur in the images or halos around edges in the images.
Abstract: Lighting and surge protection circuitry for protection of a differential pair includes a diode bridge circuit having a first pair and a second pair of connections to the diode bridge circuit, with the first pair of connections configured to be coupled to a pair of differential inputs of a functional circuit and a first diode coupled between the second pair of connections; and second and third diodes coupled between the first pair of connections and ground. The lighting and surge protection circuitry also includes a diode pair coupled between an output of the functional circuit being protected and power and ground terminals and a small resistance in series with the output of the functional circuit.
Abstract: A method and system for balancing the load and resource requirements in a digital video distribution system between a video server and its video clients by allowing the server and the clients to exchange resource capabilities with each other. Upon receipt of a request for a video stream from among available video content, the server determines whether it or the requesting client should scale the video stream based on which entity, client or server, is better equipped to scale the requested video stream to comply with the requesting client's resources and resolution capacity.
Abstract: A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the background model to the current frame to identify changed pixel patches. The analysis system uses morphological image processing to generate masks based on the changed pixel patches. Next, the analysis system applies the masks to the background model and the current frames to determine whether the changed pixel patches are characteristic of abandoned or removed objects within the video data.
Type:
Grant
Filed:
March 4, 2013
Date of Patent:
January 12, 2016
Assignee:
Sensormatic Electronics, LLC
Inventors:
Changchun Li, Ian Westmacott, Mirko Ristivojevic, Matthew A. Gruenke
Abstract: In a system and method for managing evacuations of buildings, in response to detection of a fire, a control panel initiates an alarm condition and activates annunciation devices to signal that an evacuation of the building is required. A positioning and evacuation system tracks locations of occupants in the building and the progression of the fire. The positioning and evacuation system generates individualized evacuation paths for the occupants, which are transmitted to and displayed on mobile computing devices of the occupants. Additionally, the positioning and evacuation system generates turn by turn directions of the individualized evacuation paths, which are displayed on three dimensional maps or with augmented reality on the mobile computing devices of the occupants.
Type:
Application
Filed:
May 28, 2014
Publication date:
December 3, 2015
Applicant:
Sensormatic Electronics, LLC
Inventors:
Amit Kumar Sharma, Rakesh Kumar, Shubhendu Konar
Abstract: A system and method for protocol translation between security devices in a security network using a transforming router. The router utilizes protocol templates to identify the protocols that encapsulate messages sent by the devices, and to determine the format of the messages. Using the protocol templates, the router translates the messages from protocols of source security devices to an intermediate protocol, translates the messages in the intermediate protocol into destination protocols for destination security devices, and forwards the messages to the destination security devices.
Abstract: Selection and display of adaptive rate video streams in a video security system in which user devices such as mobile computing devices mix and display multiple streams concurrently from security cameras on the user devices. A client application running on the user devices determines available buffer resources on the user devices, and enables selection of one or more video streams from a grid displayed on a display of the user devices. In response to the determined resources, the client application obtains higher bit rate video streams for the selected video streams and lower bit rate video streams for the non-selected video streams. The client application then displays the higher bit rate streams in visually distinct focus panes that attract the attention of an operator and displays the lower bit rate streams in less visually distinct periphery panes. In a preferred embodiment, operators can select a stream from the periphery panes to display as higher bit rate stream in a focus pane.
Abstract: A pan tilt zoom (PTZ) camera system implements a disc valve system to enhance the cooling of electronics. The disc valve system includes a static camera base and a rotating camera pan bearing. The static camera base has static base vent slots arranged along the perimeter of the static camera base. The rotating camera pan bearing includes at least one pan bearing vent slot that aligns with the static base vent slots. During rotation of the rotating camera pan bearing, the at least one pan bearing vent slot aligns with the static base vent slots enabling movement of air over electronics of the (PTZ) camera system.
Abstract: An integrated surveillance system combining video surveillance and data from other sensor-based security networks is used to identify activities that may require attention.
Abstract: A method and system for configuring security devices on a security network. A mobile computing device reads spatially-encoded optical machine-readable indicia, decodes the indicia, and extracts encoded configuration information for the security devices. The configuration information from the indicia is then transmitted to a monitoring station, which uses the configuration information to configure communication with the security devices on the security network.
Abstract: A system and method for operating a network security system implementing security cameras, motion sensors, access control systems, security door locks, and mobile panic button devices within a monitored area. Security cameras transmit video to a network video recorder and the video is analyzed by a video analytics system to determine if a security event is occurring. If a security event occurs, a security control system calls a dispatch service, which transmits a notification to only those security guards who are within a given area of the event.
Abstract: The present invention provides a system and method for controlling a motor in a video surveillance system including a video camera, a tilt motor operable to move the video camera in a tilt direction, a pan motor operable to move the video camera in a pan direction, and a controller in electrical communication with the tilt and pan motors. The controller assesses an operational condition of the video surveillance system and, if the assessment is successful, actuates at least one of the tilt motor and pan motor to move the video camera along a first predetermined motion pattern. In addition, if the assessment is unsuccessful, the controller actuates at least one of the tilt motor and pan motor to move the video camera along a second predetermined motion pattern.
Abstract: A system and method for enabling users to run remote applications on access control readers located throughout office buildings. A system administrator creates different remote applications groups such as admin, engineer or cardholder and then assigns users to one of the remote application groups. Users are then able to run the remote applications assigned to their remote application group from any of the access control readers located throughout the office building.
Type:
Grant
Filed:
September 18, 2012
Date of Patent:
November 18, 2014
Assignee:
Sensormatic Electronics, LLC
Inventors:
Margaret Marshall Chesney, Francis Donnelly
Abstract: A system and method for authenticating user requests issued from embedded applets running on web-accessible user devices. The server system generates authentication tokens associated with user credentials, in response to user requests for HTML pages that include the embedded applets. The server system stores the authentication tokens on the server system, and includes the authentication tokens in URLs within applet tags in the HTML pages returned to the user devices. When the applets download and request content from the server system, the applets supply the previously included authentication tokens in the URLs that identify the requested content. Upon finding a match between the applet-supplied authentication tokens and the stored authentication tokens, the server identifies the user as a trusted user, and responds with the requested content. This can be used to eliminate HTTP- based authentication challenges for subsequent user access.
Abstract: A system and method for an access control system for an elevator system that overrides landing matrices that define the access to the floors in the elevator system. The system overrides the landing matrices of the access control system in response to conditions defined by security system operators, such as emergency situations, and sends the landing matrices to elevator controllers for controlling the access to the floors. In examples, the system supports configuration of vendor-neutral landing matrix objects sent to the access control system over a security network for creating new landing matrices, and overriding the contents of the existing landing matrices.
Abstract: The present invention provides a video surveillance system, having a video camera; a motor operable to move the video camera; and a processor monitoring a value of a signal provided to the motor, the processor terminating the signal to the motor when the monitored signal value exceeds a predetermined value for a predetermined period of time. A network may be coupled to the processor for communication of the signal termination. The processor may reinitiate a signal transmission to the motor sufficient to maintain a position of the motor after a predetermined period of time, and the processor may monitor the signal transmission and adjust at least one of a zoom setting and focus setting of the video camera based at least in part on the monitored signal.
Abstract: A system and method for protocol translation between security devices in a security network using a transforming router. The router utilizes protocol templates to identify the protocols that encapsulate messages sent by the devices, and to determine the format of the messages. Using the protocol templates, the router translates the messages from protocols of source security devices to an intermediate protocol, translates the messages in the intermediate protocol into destination protocols for destination security devices, and forwards the messages to the destination security devices.
Abstract: A system is provided. The system includes a detacher. The detacher includes a field source. The field source is arranged to provide a first magnetic field when power is applied to the field source. The detacher further includes a magnet arranged to provide a second magnetic field. The magnet is movable from a non-detach position to a detach position when exposed to the first magnetic field. The second magnetic field is arranged to unlock a security tag when the magnet is at the detach location. The system further includes an activation device. The activation device includes a processor configured to trigger power to be supplied to the field source.