US20190385436A1 - Systems and methods for managing alert notifications from a secured area - Google Patents
Systems and methods for managing alert notifications from a secured area Download PDFInfo
- Publication number
- US20190385436A1 US20190385436A1 US16/008,400 US201816008400A US2019385436A1 US 20190385436 A1 US20190385436 A1 US 20190385436A1 US 201816008400 A US201816008400 A US 201816008400A US 2019385436 A1 US2019385436 A1 US 2019385436A1
- Authority
- US
- United States
- Prior art keywords
- scenario
- secured area
- processor
- notification
- person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/103—Static body considered as a whole, e.g. static pedestrian or occupant recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/207—Surveillance aspects at ATMs
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0297—Robbery alarms, e.g. hold-up alarms, bag snatching alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/182—Level alarms, e.g. alarms responsive to variables exceeding a threshold
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/001—Alarm cancelling procedures or alarm forwarding decisions, e.g. based on absence of alarm confirmation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/005—Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/006—Alarm destination chosen according to type of event, e.g. in case of fire phone the fire service, in case of medical emergency phone the ambulance
Definitions
- the present invention relates generally to systems and methods for managing alert notifications from a secured area. More particularly, the present invention relates to systems and methods that employ artificial intelligence modules in conjunction with a cloud server and a mobile device to streamline and manage the alert notifications from the secured area.
- Known systems and methods for managing alert notifications from secured areas employ simple sensors or rely on manual monitoring.
- known systems and methods that employ simple sensors typically send a large volume of alert notifications to a monitoring station, which can result in critical alert notifications being missed.
- Some systems and methods have been developed to reduce the large volume of alert notifications sent to the monitoring station by making sensor data time sensitive, but doing so can cause systems and methods to miss critical conditions in the secured areas.
- known systems and methods that employ manual monitoring can also result in missed threats because operators typically view a large volume of secured areas simultaneously.
- FIG. 1 is a block diagram of a system in accordance with disclosed embodiments
- FIG. 2 is a block diagram of a system in accordance with disclosed embodiments
- FIG. 3 is a flow diagram of a method in accordance with disclosed embodiments.
- FIG. 4 is a flow diagram of a method in accordance with disclosed embodiments.
- Embodiments disclosed herein can include systems and methods for managing alert notifications from a first secured area.
- Such systems and methods can include a first surveillance device, a first artificial intelligence module (a processor), a cloud server, and a mobile device communicating with one another using known local and remote wireless and wired mediums.
- the first surveillance device can include one or more combinations of a video camera, an audio sensor, an infrared sensor, and the like, and first data captured and generated by the first surveillance device can include audio data and/or video data captured from the first secured area.
- Systems and methods disclosed herein can include the first surveillance device monitoring the first secured area and transmitting the first data to the first artificial intelligence module and the first artificial intelligence module using the first data to identify a first scenario associated with the first secured area and a first notification priority of the first scenario identified.
- the first notification priority is at or above a preconfigured level
- the first artificial intelligence module can transmit a first alert notification to the cloud server indicative of the first scenario identified, and responsive thereto, the cloud server can transmit the first alert notification to the mobile device.
- the first artificial intelligence module can identify the first scenario in which the first data indicates that multiple people are present in the first secured area in excess of a predetermined number or in which the first data indicates that a weapon is in the first secured area, identify the first notification priority associated with the first scenario as a high level, for example, the preconfigured level, and responsive thereto, transmit the first alert notification to the cloud server.
- the first artificial intelligence module can initiate a local action in the first secured area to resolve the first scenario identified.
- the first artificial intelligence module determines that the local action fails to resolve the first scenario identified, the first artificial intelligence module can increase the first notification priority to the preconfigured level, thereby causing the first artificial intelligence module to transmit the first alert notification to the cloud server.
- the first artificial intelligence module can identify the first scenario in which the first data indicates that a single person in the first secured area is wearing a mask or otherwise obscuring his identity, identify the first notification priority associated with the first scenario as a medium level, and initiate the local action that includes broadcasting a prerecorded local message in the first secured area instructing the single person to remove the mask or otherwise stop obscuring his identity. If the first artificial intelligence module identifies the single person complying with those instructions, then the first artificial intelligence module can identify the first scenario as being resolved. However, if the first artificial intelligence module fails to identify the single person complying with those instructions, then the first artificial intelligence module can increase the first notification priority to the high level, for example, the preconfigured level, and responsive thereto, transmit the first alert notification to the cloud server.
- the first artificial intelligence module can increase the first notification priority to the high level, for example, the preconfigured level, and responsive thereto, transmit the first alert notification to the cloud server.
- the first artificial intelligence module can determine an identity of an individual present in the first secured area and identify the first scenario responsive to both the first data from the first surveillance device and the identity of the individual. For example, when the first artificial intelligence module identifies that the first data is indicative of the first scenario in which the weapon is identified in the first secured area, but determines the identity of the individual by recognizing a face of an authorized person, such as a security guard, the first artificial intelligence module can refrain from identifying the high level of the first notification priority associated with the first scenario.
- the first artificial intelligence module can include an integrated face recognition processor or communicate with a separate face recognition processor.
- the first artificial intelligence module can include a trained artificial intelligence model saved in a database device of the first artificial intelligence module.
- the trained artificial intelligence model can include a deep learning algorithm trained using historical data from the first surveillance device during known scenarios.
- the first artificial intelligence model can analyze the historical data to identify patterns and other features of the first data from the first surveillance device that are indicative of the known scenarios, that is, the first scenario.
- the trained artificial intelligence model disclosed herein can include recurrent neural networks and deep neural networks.
- the first artificial intelligence module can be located within or outside of the first secured area. Additionally or alternatively, in some embodiments, the first artificial intelligence module can be a standalone device or integrated with the first surveillance device, the cloud server, or a controller of the first surveillance device.
- the first alert notification can include a copy of the first data from the first surveillance device. Additionally or alternatively, in some embodiments, the first alert notification can include information or instructions for a security guard assigned to the first secured area. In some embodiments, the information or the instructions for the security guard can be dependent on a day and a time when the first alert notification is transmitted. For example, when a plurality of security guards are assigned to protect the first secured area on different days and at different times, the cloud server can insert the information or the instructions into the first alert notification for one of the plurality of security guards assigned to protect the first secured area on the day and the time that the cloud server transmits the first alert notification to the mobile device. In some embodiments, the mobile device can contact the one of the plurality of security guards using the information or the instructions in the first alert notification, and in some embodiments, the mobile device can contact the one of the plurality of security guards via the cloud server.
- systems and methods disclosed herein can include a second surveillance device that monitors a second secured area and transmits second data captured by the second surveillance device to a second artificial intelligence module that uses the second data to identify a second scenario associated with the second secured area and a second notification priority of the second scenario identified.
- the second artificial intelligence module can transmit a second alert notification to the cloud server indicative of the second scenario identified, and responsive thereto, the cloud server can transmit the second alert notification to the mobile device.
- FIG. 1 is a block diagram of a system 20 A in accordance with disclosed embodiments.
- the system 20 A can include a first surveillance device 22 , a first artificial intelligence module 24 , a cloud server 26 , a mobile device 28 , a first local notification device 30 , and a first controller 32 .
- the first surveillance device 22 , the first artificial intelligence module 24 , the first local notification device 30 , and the first controller 32 can be located in a first secured area SA 1
- the cloud server 26 and the mobile device 28 can be remote from the first secured area SA 1 and communicate with the first artificial intelligence module 24 via a network N.
- the network N can include a wide area network, such as the Internet or a cellular network.
- FIG. 2 is a block diagram of a system 20 B in accordance with disclosed embodiments.
- the system 20 B is similar to the system 20 A except that system 20 B includes a second surveillance device 34 , a second artificial intelligence module 36 , a second local notification device 38 , and a second controller 40 located in a second secured area SA 2 .
- FIG. 3 is a flow diagram of a method 100 in accordance with disclosed embodiments.
- the method 100 can include the first controller 32 or the second controller 40 sending a registration request to the cloud server 26 , as in 102 .
- the registration request can include an identification number and a password for the cloud server 26 .
- the cloud server 26 can register the first controller 32 or the second controller 40 , and responsive to the registration request and a completed registration, the method 100 can include the cloud server 26 sending a registration confirmation signal to the first controller 32 or the second controller 40 , as in 104 .
- the method 100 can also include the controller 32 or the controller 40 periodically sending a status update to the cloud server 26 , as in 106 , and responsive thereto, the cloud server 26 transmitting an acknowledgement signal to the first controller 32 or the second controller 40 , as in 108 .
- the first controller 32 or the second controller 40 can retransmit the status update to the cloud server 26 when the acknowledgement signal is not received thereby within a predetermined period of time.
- the method 100 can also include the mobile device 28 sending a login request to the cloud server 26 , as in 110 .
- the log in request can contain the identification number and the password for the cloud server 26 .
- the method 100 can include the cloud server 26 sending a log in confirmation signal to the mobile device 28 , as in 112 .
- the method 100 can include the mobile device 28 sending an event history request to the cloud server 26 to fetch event history for the first secured area SA 1 or the second secured area SA 2 , as in 114 , and responsive thereto, the cloud server 26 sending an event history response signal documenting the event history for the first secured area SA 1 or the second secured area SA 2 to the mobile device 28 , as in 116 .
- a user interface device of the mobile device 28 can display the event history for the first secured area SA 1 or the second secured area SA 2 , for example, in a dashboard-type window on the user interface device of the mobile device 28 .
- FIG. 4 is a flow diagram of a method 200 in accordance with disclosed embodiments.
- the method 200 can include the first artificial intelligence module 24 or the second artificial intelligence module 36 identifying a scenario in the first secured area SA 1 or the second secured area SA 2 and associated with a notification priority having a high level and sending an alert notification indicative of the scenario to the cloud server 26 , as in 202 , the cloud server 26 sending the alert notification to the mobile device 28 , as in 204 , and the mobile device sending an acknowledgement signal to the cloud server 26 , as in 206 .
- the first artificial intelligence module 24 or the second artificial intelligence module 36 identifying a scenario in the first secured area SA 1 or the second secured area SA 2 and associated with a notification priority having a high level and sending an alert notification indicative of the scenario to the cloud server 26 , as in 202 , the cloud server 26 sending the alert notification to the mobile device 28 , as in 204 , and the mobile device sending an acknowledgement signal to the cloud server 26 , as in 206 .
- the method 200 can also include the mobile device 28 sending an instructional signal to the cloud server 26 instructing the cloud server 26 to take action to resolve the scenario, as in 208 , and the cloud server 26 initiating the action, for example, calling security or the like, as in 210 . Additionally or alternatively, in some embodiments, the mobile device 28 can initiate the action without transmitting the instructional signal to the cloud server 26 .
- the method 200 can include the first artificial intelligence module 24 or the second artificial intelligence module 36 transmitting an update signal to the cloud server 26 , as in 212 , and responsive thereto, the cloud server sending a notification signal to the mobile device 28 , as in 214 .
- each of the first surveillance device 22 , the first artificial intelligence module 24 , the cloud server 26 , the mobile device 28 , the first local notification device 30 , the first controller 32 , the second surveillance device 34 , the second artificial intelligence module 36 , the second locl notification device 38 , and the second controller 40 disclosed herein can include a respective transceiver device and a respective memory device, each of which can be in communication with respective control circuitry, one or more respective programmable processors, and respective executable control software as would be understood by one of ordinary skill in the art.
- the respective executable control software can be stored on a respective transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like, and some or all of the respective control circuitry, the respective programmable processors, and the respective control software can execute and control at least some of the methods described herein.
Landscapes
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Emergency Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Public Health (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
Description
- The present invention relates generally to systems and methods for managing alert notifications from a secured area. More particularly, the present invention relates to systems and methods that employ artificial intelligence modules in conjunction with a cloud server and a mobile device to streamline and manage the alert notifications from the secured area.
- Known systems and methods for managing alert notifications from secured areas employ simple sensors or rely on manual monitoring. For example, known systems and methods that employ simple sensors typically send a large volume of alert notifications to a monitoring station, which can result in critical alert notifications being missed. Some systems and methods have been developed to reduce the large volume of alert notifications sent to the monitoring station by making sensor data time sensitive, but doing so can cause systems and methods to miss critical conditions in the secured areas. Similarly, known systems and methods that employ manual monitoring can also result in missed threats because operators typically view a large volume of secured areas simultaneously.
- In view of the above, there is a continuing, ongoing need for improved systems and methods.
-
FIG. 1 is a block diagram of a system in accordance with disclosed embodiments; -
FIG. 2 is a block diagram of a system in accordance with disclosed embodiments; -
FIG. 3 is a flow diagram of a method in accordance with disclosed embodiments; and -
FIG. 4 is a flow diagram of a method in accordance with disclosed embodiments. - While this invention is susceptible of an embodiment in many different forms, there are shown in the drawings and will be described herein in detail specific embodiments thereof with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.
- Embodiments disclosed herein can include systems and methods for managing alert notifications from a first secured area. Such systems and methods can include a first surveillance device, a first artificial intelligence module (a processor), a cloud server, and a mobile device communicating with one another using known local and remote wireless and wired mediums. In some embodiments, the first surveillance device can include one or more combinations of a video camera, an audio sensor, an infrared sensor, and the like, and first data captured and generated by the first surveillance device can include audio data and/or video data captured from the first secured area.
- Systems and methods disclosed herein can include the first surveillance device monitoring the first secured area and transmitting the first data to the first artificial intelligence module and the first artificial intelligence module using the first data to identify a first scenario associated with the first secured area and a first notification priority of the first scenario identified. When the first notification priority is at or above a preconfigured level, the first artificial intelligence module can transmit a first alert notification to the cloud server indicative of the first scenario identified, and responsive thereto, the cloud server can transmit the first alert notification to the mobile device. For example, the first artificial intelligence module can identify the first scenario in which the first data indicates that multiple people are present in the first secured area in excess of a predetermined number or in which the first data indicates that a weapon is in the first secured area, identify the first notification priority associated with the first scenario as a high level, for example, the preconfigured level, and responsive thereto, transmit the first alert notification to the cloud server.
- However, when the first notification priority is below the preconfigured level, the first artificial intelligence module can initiate a local action in the first secured area to resolve the first scenario identified. When the first artificial intelligence module determines that the local action fails to resolve the first scenario identified, the first artificial intelligence module can increase the first notification priority to the preconfigured level, thereby causing the first artificial intelligence module to transmit the first alert notification to the cloud server. For example, the first artificial intelligence module can identify the first scenario in which the first data indicates that a single person in the first secured area is wearing a mask or otherwise obscuring his identity, identify the first notification priority associated with the first scenario as a medium level, and initiate the local action that includes broadcasting a prerecorded local message in the first secured area instructing the single person to remove the mask or otherwise stop obscuring his identity. If the first artificial intelligence module identifies the single person complying with those instructions, then the first artificial intelligence module can identify the first scenario as being resolved. However, if the first artificial intelligence module fails to identify the single person complying with those instructions, then the first artificial intelligence module can increase the first notification priority to the high level, for example, the preconfigured level, and responsive thereto, transmit the first alert notification to the cloud server.
- In some embodiments, the first artificial intelligence module can determine an identity of an individual present in the first secured area and identify the first scenario responsive to both the first data from the first surveillance device and the identity of the individual. For example, when the first artificial intelligence module identifies that the first data is indicative of the first scenario in which the weapon is identified in the first secured area, but determines the identity of the individual by recognizing a face of an authorized person, such as a security guard, the first artificial intelligence module can refrain from identifying the high level of the first notification priority associated with the first scenario. In some embodiments, the first artificial intelligence module can include an integrated face recognition processor or communicate with a separate face recognition processor.
- In some embodiments, the first artificial intelligence module can include a trained artificial intelligence model saved in a database device of the first artificial intelligence module. In some embodiments, the trained artificial intelligence model can include a deep learning algorithm trained using historical data from the first surveillance device during known scenarios. In this regard, the first artificial intelligence model can analyze the historical data to identify patterns and other features of the first data from the first surveillance device that are indicative of the known scenarios, that is, the first scenario. In some embodiments, the trained artificial intelligence model disclosed herein can include recurrent neural networks and deep neural networks.
- In some embodiments, the first artificial intelligence module can be located within or outside of the first secured area. Additionally or alternatively, in some embodiments, the first artificial intelligence module can be a standalone device or integrated with the first surveillance device, the cloud server, or a controller of the first surveillance device.
- In some embodiments, the first alert notification can include a copy of the first data from the first surveillance device. Additionally or alternatively, in some embodiments, the first alert notification can include information or instructions for a security guard assigned to the first secured area. In some embodiments, the information or the instructions for the security guard can be dependent on a day and a time when the first alert notification is transmitted. For example, when a plurality of security guards are assigned to protect the first secured area on different days and at different times, the cloud server can insert the information or the instructions into the first alert notification for one of the plurality of security guards assigned to protect the first secured area on the day and the time that the cloud server transmits the first alert notification to the mobile device. In some embodiments, the mobile device can contact the one of the plurality of security guards using the information or the instructions in the first alert notification, and in some embodiments, the mobile device can contact the one of the plurality of security guards via the cloud server.
- In some embodiments, systems and methods disclosed herein can include a second surveillance device that monitors a second secured area and transmits second data captured by the second surveillance device to a second artificial intelligence module that uses the second data to identify a second scenario associated with the second secured area and a second notification priority of the second scenario identified. When the second notification priority is at or above the preconfigured level, the second artificial intelligence module can transmit a second alert notification to the cloud server indicative of the second scenario identified, and responsive thereto, the cloud server can transmit the second alert notification to the mobile device.
-
FIG. 1 is a block diagram of a system 20A in accordance with disclosed embodiments. As seen inFIG. 1 , the system 20A can include afirst surveillance device 22, a firstartificial intelligence module 24, acloud server 26, amobile device 28, a firstlocal notification device 30, and afirst controller 32. Thefirst surveillance device 22, the firstartificial intelligence module 24, the firstlocal notification device 30, and thefirst controller 32 can be located in a first secured area SA1, and thecloud server 26 and themobile device 28 can be remote from the first secured area SA1 and communicate with the firstartificial intelligence module 24 via a network N. In some embodiments, the network N can include a wide area network, such as the Internet or a cellular network. -
FIG. 2 is a block diagram of asystem 20B in accordance with disclosed embodiments. Thesystem 20B is similar to the system 20A except thatsystem 20B includes asecond surveillance device 34, a secondartificial intelligence module 36, a secondlocal notification device 38, and asecond controller 40 located in a second secured area SA2. -
FIG. 3 is a flow diagram of amethod 100 in accordance with disclosed embodiments. As seen inFIG. 3 , themethod 100 can include thefirst controller 32 or thesecond controller 40 sending a registration request to thecloud server 26, as in 102. In some embodiments, the registration request can include an identification number and a password for thecloud server 26. Thecloud server 26 can register thefirst controller 32 or thesecond controller 40, and responsive to the registration request and a completed registration, themethod 100 can include thecloud server 26 sending a registration confirmation signal to thefirst controller 32 or thesecond controller 40, as in 104. Themethod 100 can also include thecontroller 32 or thecontroller 40 periodically sending a status update to thecloud server 26, as in 106, and responsive thereto, thecloud server 26 transmitting an acknowledgement signal to thefirst controller 32 or thesecond controller 40, as in 108. In some embodiments, thefirst controller 32 or thesecond controller 40 can retransmit the status update to thecloud server 26 when the acknowledgement signal is not received thereby within a predetermined period of time. - As seen in
FIG. 3 , themethod 100 can also include themobile device 28 sending a login request to thecloud server 26, as in 110. In some embodiments, the log in request can contain the identification number and the password for thecloud server 26. Responsive to the login request, themethod 100 can include thecloud server 26 sending a log in confirmation signal to themobile device 28, as in 112. Then, themethod 100 can include themobile device 28 sending an event history request to thecloud server 26 to fetch event history for the first secured area SA1 or the second secured area SA2, as in 114, and responsive thereto, thecloud server 26 sending an event history response signal documenting the event history for the first secured area SA1 or the second secured area SA2 to themobile device 28, as in 116. In some embodiments, a user interface device of themobile device 28 can display the event history for the first secured area SA1 or the second secured area SA2, for example, in a dashboard-type window on the user interface device of themobile device 28. -
FIG. 4 is a flow diagram of amethod 200 in accordance with disclosed embodiments. As seen inFIG. 4 , themethod 200 can include the firstartificial intelligence module 24 or the secondartificial intelligence module 36 identifying a scenario in the first secured area SA1 or the second secured area SA2 and associated with a notification priority having a high level and sending an alert notification indicative of the scenario to thecloud server 26, as in 202, thecloud server 26 sending the alert notification to themobile device 28, as in 204, and the mobile device sending an acknowledgement signal to thecloud server 26, as in 206. As seen inFIG. 4 , themethod 200 can also include themobile device 28 sending an instructional signal to thecloud server 26 instructing thecloud server 26 to take action to resolve the scenario, as in 208, and thecloud server 26 initiating the action, for example, calling security or the like, as in 210. Additionally or alternatively, in some embodiments, themobile device 28 can initiate the action without transmitting the instructional signal to thecloud server 26. Regardless of the embodiment, when firstartificial intelligence module 24 or the secondartificial intelligence module 36 identifies the scenario in the first secured area SA1 or the second secured area SA2 as being resolved, themethod 200 can include the firstartificial intelligence module 24 or the secondartificial intelligence module 36 transmitting an update signal to thecloud server 26, as in 212, and responsive thereto, the cloud server sending a notification signal to themobile device 28, as in 214. - It is to be understood that each of the
first surveillance device 22, the firstartificial intelligence module 24, thecloud server 26, themobile device 28, the firstlocal notification device 30, thefirst controller 32, thesecond surveillance device 34, the secondartificial intelligence module 36, the secondlocl notification device 38, and thesecond controller 40 disclosed herein can include a respective transceiver device and a respective memory device, each of which can be in communication with respective control circuitry, one or more respective programmable processors, and respective executable control software as would be understood by one of ordinary skill in the art. In some embodiments, the respective executable control software can be stored on a respective transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like, and some or all of the respective control circuitry, the respective programmable processors, and the respective control software can execute and control at least some of the methods described herein. - Although a few embodiments have been described in detail above, other modifications are possible. For example, the steps described above do not require the particular order described or sequential order to achieve desirable results. Other steps may be provided, steps may be eliminated from the described flows, and other components may be added to or removed from the described systems. Other embodiments may be within the scope of the invention.
- From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.
Claims (19)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/008,400 US10510239B1 (en) | 2018-06-14 | 2018-06-14 | Systems and methods for managing alert notifications from a secured area |
US16/712,925 US10984650B2 (en) | 2018-06-14 | 2019-12-12 | Systems and methods for managing alert notifications from a secured area |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/008,400 US10510239B1 (en) | 2018-06-14 | 2018-06-14 | Systems and methods for managing alert notifications from a secured area |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/712,925 Continuation US10984650B2 (en) | 2018-06-14 | 2019-12-12 | Systems and methods for managing alert notifications from a secured area |
Publications (2)
Publication Number | Publication Date |
---|---|
US10510239B1 US10510239B1 (en) | 2019-12-17 |
US20190385436A1 true US20190385436A1 (en) | 2019-12-19 |
Family
ID=68840128
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/008,400 Active US10510239B1 (en) | 2018-06-14 | 2018-06-14 | Systems and methods for managing alert notifications from a secured area |
US16/712,925 Active US10984650B2 (en) | 2018-06-14 | 2019-12-12 | Systems and methods for managing alert notifications from a secured area |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/712,925 Active US10984650B2 (en) | 2018-06-14 | 2019-12-12 | Systems and methods for managing alert notifications from a secured area |
Country Status (1)
Country | Link |
---|---|
US (2) | US10510239B1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190385090A1 (en) * | 2018-06-14 | 2019-12-19 | Honeywell International Inc. | Systems and methods for using artificial intelligence models to identify a current threat scenario |
US11127276B2 (en) * | 2020-01-27 | 2021-09-21 | James Michael Prokes | Emergency alarm system for restricted spaces |
CN113538848A (en) * | 2021-07-17 | 2021-10-22 | 吴腾初 | Cloud-melting sound-light alarm system |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2183878B (en) | 1985-10-11 | 1989-09-20 | Matsushita Electric Works Ltd | Abnormality supervising system |
US5091780A (en) | 1990-05-09 | 1992-02-25 | Carnegie-Mellon University | A trainable security system emthod for the same |
US5237408A (en) | 1991-08-02 | 1993-08-17 | Presearch Incorporated | Retrofitting digital video surveillance system |
US5519669A (en) | 1993-08-19 | 1996-05-21 | At&T Corp. | Acoustically monitored site surveillance and security system for ATM machines and other facilities |
US5666157A (en) | 1995-01-03 | 1997-09-09 | Arc Incorporated | Abnormality detection and surveillance system |
US7023913B1 (en) | 2000-06-14 | 2006-04-04 | Monroe David A | Digital security multimedia sensor |
WO2002029741A2 (en) * | 2000-10-03 | 2002-04-11 | Zingher Joseph P | Biometric system and method for detecting duress transactions |
US7868912B2 (en) | 2000-10-24 | 2011-01-11 | Objectvideo, Inc. | Video surveillance system employing video primitives |
US8711217B2 (en) | 2000-10-24 | 2014-04-29 | Objectvideo, Inc. | Video surveillance system employing video primitives |
US20040223629A1 (en) | 2003-05-06 | 2004-11-11 | Viswis, Inc. | Facial surveillance system and method |
JP4000596B2 (en) * | 2003-12-24 | 2007-10-31 | オムロン株式会社 | Notification system, electronic device and method, and program |
US7403116B2 (en) * | 2005-02-28 | 2008-07-22 | Westec Intelligent Surveillance, Inc. | Central monitoring/managed surveillance system and method |
US7619647B2 (en) | 2005-04-20 | 2009-11-17 | Mitsubishi Electric Research Laboratories, Inc. | Context aware surveillance system using a hybrid sensor network |
US20070257986A1 (en) | 2006-05-05 | 2007-11-08 | Ivanov Yuri A | Method for processing queries for surveillance tasks |
US8797210B2 (en) * | 2006-07-14 | 2014-08-05 | Securealert, Inc. | Remote tracking device and a system and method for two-way voice communication between the device and a monitoring center |
US20080251578A1 (en) * | 2007-04-10 | 2008-10-16 | Jansing Nicholas E | Atm security system and method of use |
US8531286B2 (en) | 2007-09-05 | 2013-09-10 | Stanley Convergent Security Solutions, Inc. | System and method for monitoring security at a premises using line card with secondary communications channel |
US20120019353A1 (en) * | 2010-07-26 | 2012-01-26 | Mysnapcam, Llc | Systems and Methods for Automatically Activating Monitoring Systems |
CA3182299A1 (en) * | 2013-10-07 | 2015-04-16 | Google Llc | Visual and auditory user notification methods for smart-home hazard detector |
US9342973B2 (en) * | 2014-05-02 | 2016-05-17 | Htc Corporation | Fall event handling method and mobile electronic device using the same |
US10896591B2 (en) * | 2015-07-31 | 2021-01-19 | Motorola Mobility Llc | Eyewear with proximity sensors to detect outside line of sight presence and corresponding methods |
US9911527B2 (en) * | 2015-11-17 | 2018-03-06 | James J. Bitetto | Electromagnetic safety device |
TWI582732B (en) * | 2016-03-17 | 2017-05-11 | Automatic display of multimedia monitoring system and its information processing method | |
US10262517B2 (en) * | 2016-06-14 | 2019-04-16 | Board Of Trustees Of The University Of Arkansas | Real-time awareness of environmental hazards for fall prevention |
US9953518B2 (en) * | 2016-07-29 | 2018-04-24 | Honeywell International Inc. | Systems and methods for predicting and increasing the threat level at ATM centers prior to alarm event detection |
JP6776143B2 (en) * | 2017-02-03 | 2020-10-28 | 横河電機株式会社 | Water level measurement system |
WO2018222982A1 (en) * | 2017-06-01 | 2018-12-06 | Gary Franklin Bart | Control access utilizing video analytics |
-
2018
- 2018-06-14 US US16/008,400 patent/US10510239B1/en active Active
-
2019
- 2019-12-12 US US16/712,925 patent/US10984650B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20200126396A1 (en) | 2020-04-23 |
US10510239B1 (en) | 2019-12-17 |
US10984650B2 (en) | 2021-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3729391B1 (en) | Monitoring system for securing networks from hacker drones | |
EP3229214B1 (en) | System and method for tracking unauthorized intruders using drones integrated with a security system | |
US10657749B2 (en) | Automatic system access using facial recognition | |
US10235822B2 (en) | Automatic system access using facial recognition | |
US10984650B2 (en) | Systems and methods for managing alert notifications from a secured area | |
EP3127357B1 (en) | System of living | |
CN109981975B (en) | System and method for dynamically masking videos and images captured by a drone device camera | |
EP3654678B1 (en) | System, device, and method for recommending public safety resource allocation | |
CA3105060A1 (en) | Object tracking using disparate monitoring systems | |
CN108012113A (en) | A kind of remotely intelligently monitoring method and system | |
US10419728B2 (en) | Monitoring system having personal information protection function and method thereof | |
US20210326563A1 (en) | Electronic fingerprint device for identifying perpetrators and witnesses of a crime and method thereof | |
AU2021282382A1 (en) | A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
KR101728158B1 (en) | Fire safety management and security agency system, and method therefor | |
JP6663678B2 (en) | Security camera for outdoor installation and security system equipped with the security camera for security | |
US9847016B2 (en) | System and method of communicating data from an alarm system to emergency services personnel | |
KR101664556B1 (en) | Social security network method and system | |
CN206058301U (en) | A kind of Prison Management System Developed | |
EP3444750A1 (en) | Cloud based systems and methods for locating a peace breaker | |
US10586432B2 (en) | Systems and methods for intrusion detection using selective masking | |
KR101744184B1 (en) | System and method for reporting automatically using by face recognition | |
KR101995030B1 (en) | Personal safety guard providing method with location and arrival time | |
CN114758475A (en) | Method and device for fall detection, fall detection system and storage medium | |
EP4107663A1 (en) | Apparatus and method for operating a detection and response system | |
CN113160459A (en) | Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HONEYWELL INTERNATIONAL INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TRIVEDI, ISHIT;BRAHMAJOSYULA, JAGADEESH;KATOLE, ATUL LAXMAN;AND OTHERS;SIGNING DATES FROM 20180531 TO 20180604;REEL/FRAME:046088/0775 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |