Abstract: A camera system includes a base including a processing circuit and a communications circuit, a plurality of imagers, and a plurality of connections. The processing circuit is positioned in the base. The plurality of imagers are coupled to the processing circuit via the communications circuit, each imager including a lens and a sensor module that receives light via the lens and outputs a plurality of images based on the received light. The plurality of connections couple each imager to the processing circuit via the communications circuit. Each imager is mounted to an outside surface of the base or spaced from the base, each connection including at least one of a wired connection and a wireless connection. The processing circuit receives the plurality of images from each imager via each respective connection and generates a combined image using the plurality of images.
Abstract: A computer implemented method for controlling the environmental conditions of a building in accordance with feedback from the occupants of the building is provided. The method includes detecting, by one or more processors, an occupant within a building space, and transmitting, by the one or more processors, a notification message to an occupant device associated with the occupant. The notification message includes a request to provide occupant feedback. The method includes receiving, by the one or more processors, an occupant feedback message from the occupant device. The occupant feedback message includes one or more quality ratings associated with one or more building conditions. The method includes assigning, by the one or more processors, a weighting factor to the occupant feedback message and performing an action to modify at least one of the building conditions responsive to the weighted occupant feedback message.
Abstract: A load control system includes a power supply, a load controller coupled to a load, and a supply controller. The load controller receives a first power having a first current level from the power supply, and uses the first power to cause a plurality of resistors to output a plurality of pre-defined codes. The supply controller receives the plurality of pre-defined codes, evaluates an output condition based on the plurality of pre-defined codes, and causes the power supply to output a second power having a second current level greater than the first level responsive to the plurality of pre-defined codes satisfying the output condition.
Type:
Grant
Filed:
November 29, 2018
Date of Patent:
December 8, 2020
Assignee:
Sensormatic Electronics, LLC
Inventors:
Murdo Jamie Scott McLeod, Ian R. Schofield, Timothy J. Harrison
Abstract: A system and method for identification and suppression of time varying background objects is disclosed. A proposed surveillance security system includes an image analytics system and at least one surveillance camera. The image analytics system identifies objects within image data of a scene captured by the surveillance camera, and then analyzes the objects to determine whether each object is a foreground object or a dynamic background object. In examples, the image analytics system determines whether an object is a foreground object or a dynamic background object based upon movement and/or an appearance of the object. The surveillance security system does not send alerts to users of the system for objects determined to be dynamic background objects. When users request objects of interest, the dynamic background objects are also excluded from lists of objects sent in reply messages to the users.
Type:
Grant
Filed:
October 1, 2019
Date of Patent:
December 8, 2020
Assignee:
Sensormatic Electronics, LLC
Inventors:
Rajkiran Kumar Gottumukkal, Ian Westmacott, Matthew A. Gruenke
Abstract: Adaptive system for communicating with a customer in a retail store environment includes a sensor disposed at a sensor location in a retail environment. The sensor location is selected so that the sensor captures information that facilitates identification of at least one trait associated with a customer located proximate to the sensor location. A processing system is configured to use the information to determine the at least one trait. Thereafter, in response to such determination, the processing system selectively determines a message or content selection to be displayed to the customer based at least in part on the at least one trait that has been identified.
Type:
Grant
Filed:
January 27, 2017
Date of Patent:
December 1, 2020
Assignee:
Sensormatic Electronics, LLC
Inventors:
Gilbert Fernandez, Sergio M. Perez, Dario Passadore, Craig R. Szklany
Abstract: A system and method for real time streaming and decoding of multiple simultaneous streams within a web browser is disclosed. In a preferred embodiment, a stream manager of the web browser stores decoder context data for each of the streams. The stream manager then provides the frames in conjunction with the decoder context data for consumption by a decoder of the web browser, which decodes the frames, presents the frames for display, and updates the decoder context data with the frame data of the decoded frames. In another embodiment, the stream manager is integrated within the decoder.
Type:
Grant
Filed:
August 5, 2016
Date of Patent:
December 1, 2020
Assignee:
Sensormatic Electronics, LLC
Inventors:
James Trani, Andrew Furtado, Teresa J. Seeley
Abstract: Techniques for controlling operation of sensors at a physical premises are described. The techniques process received messages corresponding to a prediction of an impending event and produce commands that modify operation of one or more specific sensors at the physical premises, send the commands that modify the operation of the one or more sensor devices at the physical premises at a period of time prior to a likely occurrence of the predicted insurable event, collect sensor information from the plurality of sensor devices deployed at the premises, and store the sensor information in a remote persistent storage system.
Abstract: A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
Abstract: A testing system and method for a security system is disclosed. In one example, the testing system includes a mobile computing device carried by an operator such as a technician and a configuration server, the configuration server communicating with one or more of an intrusion detection subsystem, video surveillance subsystem, and/or access control subsystem and providing testing information to the mobile device. In one embodiment, the testing system provides configuration information to security devices within the subsystems, where the configuration information includes associations between the devices of the subsystems for executing testing upon the devices in the associations.
Type:
Grant
Filed:
September 12, 2016
Date of Patent:
September 8, 2020
Assignee:
Sensormatic Electronics, LLC
Inventors:
Stephan Frenette, Gabriel Labrecque, Jean-Sebastien Decoste
Abstract: A surveillance system and method for providing communication between wireless input capture devices, such as cameras. The system has multiple capture devices configured to capture video and/or still images of a target environment. The system can detect events, notify users, and provide data to a user upon request. Capture devices are capable of smart cross-communication with each other and/or a base system.
Abstract: A system and method for determining relationships between fields of views of surveillance cameras is disclosed. In the system, a user device such as a mobile phone receives image data from the cameras, and an analytics system of the user device analyzes the image data to determine the relationships between the fields of views of the surveillance cameras. The relationships include overlap among fields of view of at least two of the cameras and deadzones, where deadzones are areas monitored by the cameras that are not included within any of the fields of view of any of the cameras. In a preferred embodiment, the surveillance cameras capture image data of a scene while an installer holding the user device walks one or more critical paths through the scene. The user device then analyzes image data from the cameras during the critical path definition to determine any overlap and/or deadzones.
Abstract: Systems and methods for detecting a presence of a person, robot or object in a given area using a hybrid Lighting and Inventory (“LI”) system. The methods comprise: maintaining a data store of identifiers for first tags that are readable by an internal circuit of at least one light provider; tracking (a) changes in which of said first tags are read by the at least one light provider's internal circuit during consecutive tag read processes and (b) changes in power levels of tag read signals received at the at least one light provider during the consecutive tag read processes; and using tracked information (a) and (b) to detect the presence of the person, robot or object in the given area.
Type:
Application
Filed:
May 2, 2019
Publication date:
August 20, 2020
Applicant:
Sensormatic Electronics, LLC
Inventors:
Steve E. Trivelpiece, Adam S. Bergman, Craig E. Trivelpiece, Eric F. Riggert, David P. McCullough
Abstract: Systems and methods for determining an inventory. The methods comprise: performing operations by an internal circuit of a light provider to control operations of a light element to produce visible light, where the light provider is coupled to a light fixture installed on a physical structure of a facility; and performing operations by the internal circuit to connect with a network, receive a tag identifier associated with an alert event from at least one external device via the network, read tags, and control the light element to modify at least one characteristic of the visible light produced thereby when information read from one of the tags includes the tag identifier.
Type:
Application
Filed:
February 19, 2019
Publication date:
August 20, 2020
Applicant:
Sensormatic Electronics, LLC
Inventors:
Steve E. Trivelpiece, Adam S. Bergman, Craig E. Trivelpiece, Eric F. Riggert
Abstract: Aspects of the present disclosure include methods, apparatuses, and computer readable media for controlling access including receiving registration information associating a mobile device with an access device, wherein the access device provides an access privilege to an access-controlled point, associating the mobile device with the access device, receiving a blocking request from the mobile device to suspend the access privilege to the access-controlled point provided by the access device, authenticating the blocking request, and suspending, in response to authenticating the blocking request, the access privilege to the access-controlled point provided by the access device.
Type:
Grant
Filed:
July 16, 2019
Date of Patent:
August 18, 2020
Assignee:
Sensormatic Electronics, LLC
Inventors:
Himanshu Kulshrestha, Kuldeep Sharma, Pawan Sharma, Mohd Arif
Abstract: Systems and methods for operating a security tag. The methods comprise: causing a plunger of the security tag to engage a latch of the security tag; preventing, by an anti-defeat structure of the security tag, a disengagement between the plunger and the latch when an impact force is applied to the security tag; and allowing, by the anti-defeat structure, the plunger to disengage the latch when a magnetic field is applied to the security tag.
Abstract: A system and method for modeling and distributing image data of interest to users is disclosed. Users on user devices such as mobile phones send request messages for image data captured by surveillance cameras of the system. The request messages include information for selecting the image data, such as camera number and time of recording of the image data, in examples. In response, an application server of the system collects the image data from the surveillance cameras, and supplies image data to the users based on a model that the application server creates and updates for each of the users. The model ranks image data of potential interest for each of the users, where the model is based on the information for selecting the image data provided by the users. Preferably, a machine learning application of the application server creates the model for each of the users.
Abstract: Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (“AST”) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.
Type:
Application
Filed:
January 28, 2019
Publication date:
July 30, 2020
Applicant:
Sensormatic Electronics, LLC
Inventors:
Glen Ouellette, John C.Y. Huang, Steve E. Trivelpiece, Ian Westmacott
Abstract: A security system comprises an access control node broadcasting a beacon including a time stamp and user devices generating replies to the beacon that are based on credential information for the user of the user device and the time stamp. The system relies on the users' wireless-capable mobile computing devices such as smartphones, tablets, or wireless fobs. A credential management system proves a system for the authentication of users and then issues security tokens as credential information to the users' mobile computing devices. These tokens are presented wirelessly by the devices to the security system's access control nodes, for example, where the access control nodes then decide whether to grant or deny access.
Abstract: A system and method for storing image information, such as video clips, across multiple storage devices of different business entities provides redundancy and off-site storage, but possibly without the costs associated with a traditional cloud storage system. In examples, a peer-to-peer arrangement is used. A user/customer accesses the image information via a web portal hosted by their business entity or the operator of the system or accesses the image information from a mobile device.
Abstract: Systems and methods for operating an Electronic Article Surveillance (“EAS”) system. The methods comprise: detecting movement of a plurality of security tags in a facility using Radio Frequency Identification (“RFID”); identifying which security tags of the plurality of security tags are moving towards an exit of the facility or are in a surveillance zone; determining a number of the identified security tags that are coupled to unsold objects; comparing the number to a threshold value; and causing the EAS system to issue an alarm when the number is greater than or equal to the threshold value.