Systems and methods for surveillance of a vehicle using camera images
First Claim
Patent Images
1. A surveillance system for providing security for a vehicle, comprising:
- one or more processors;
a memory communicably coupled to the one or more processors and storing;
a monitoring module including instructions that when executed by the one or more processors cause the one or more processors to, in response to detecting a surveillance event associated with the vehicle, collect information including one or more images from one or more sensors of the vehicle and one or more nearby sources about the surveillance event, wherein the monitoring module includes instructions to collect the information including instructions to acquire at least a portion of the information including the one or more images by wirelessly querying the one or more nearby sources; and
a response module including instructions that when executed by the one or more processors cause the one or more processors to classify the information according to a security profile to identify a threat type and a threat level of the surveillance event, wherein the response module includes instructions to identify the threat type and the threat level including instructions to (i) identify, using image recognition to analyze the one or more images of one or more objects, a type of the one or more objects that are proximate to the vehicle, and (ii) identify threat characteristics of the one or more objects indicative of the threat level, wherein the instructions to identify the threat characteristics include instructions to identify a pose of a person in relation to the vehicle, a biometric signature of the person, and a presence of secondary objects held by the person, andwherein the response module includes instructions to control the vehicle to provide a response to the surveillance event according to the threat type and the threat level.
4 Assignments
0 Petitions
Accused Products
Abstract
System, methods, and other embodiments described herein relate to surveillance of a vehicle. In one embodiment, a method includes, in response to detecting a surveillance event associated with the vehicle, collecting information from one or more sensors of the vehicle about the surveillance event. The method includes classifying the information according to a security profile to identify a threat type and a threat level of the surveillance event. The method includes controlling the vehicle to provide a response to the surveillance event according to the threat type and the threat level.
67 Citations
20 Claims
-
1. A surveillance system for providing security for a vehicle, comprising:
-
one or more processors; a memory communicably coupled to the one or more processors and storing; a monitoring module including instructions that when executed by the one or more processors cause the one or more processors to, in response to detecting a surveillance event associated with the vehicle, collect information including one or more images from one or more sensors of the vehicle and one or more nearby sources about the surveillance event, wherein the monitoring module includes instructions to collect the information including instructions to acquire at least a portion of the information including the one or more images by wirelessly querying the one or more nearby sources; and a response module including instructions that when executed by the one or more processors cause the one or more processors to classify the information according to a security profile to identify a threat type and a threat level of the surveillance event, wherein the response module includes instructions to identify the threat type and the threat level including instructions to (i) identify, using image recognition to analyze the one or more images of one or more objects, a type of the one or more objects that are proximate to the vehicle, and (ii) identify threat characteristics of the one or more objects indicative of the threat level, wherein the instructions to identify the threat characteristics include instructions to identify a pose of a person in relation to the vehicle, a biometric signature of the person, and a presence of secondary objects held by the person, and wherein the response module includes instructions to control the vehicle to provide a response to the surveillance event according to the threat type and the threat level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium storing instructions that when executed by one or more processors cause the one or more processors to:
-
in response to detecting a surveillance event associated with a vehicle, collect information from one or more sensors of the vehicle and one or more nearby sources about the surveillance event, wherein the instructions to collect the information including instructions to acquire at least a portion of the information including one or more images by wirelessly querying the one or more nearby sources, classify the information according to a security profile to identify a threat type and a threat level of the surveillance event including instructions to (i) identify, using image recognition to analyze the one or more images of one or more objects, a type of the one or more objects that are proximate to the vehicle, and (ii) identify threat characteristics of the one or more objects indicative of the threat level, wherein identifying the threat characteristics includes identifying a pose of a person in relation to the vehicle, a biometric signature of the person, and a presence of secondary objects held by the person, and control the vehicle to provide a response to the surveillance event according to the threat type and the threat level. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of providing security for a vehicle, comprising:
-
in response to detecting a surveillance event associated with the vehicle, collecting information from one or more sensors of the vehicle and one or more nearby sources about the surveillance event, wherein collecting the information including one or more images includes acquiring at least a portion of the information including the one or more images by wirelessly querying the one or more nearby sources; classifying the information according to a security profile to identify a threat type and a threat level of the surveillance event including (i) identifying, using image recognition to analyze the one or more images of one or more objects, a type of the one or more objects that are proximate to the vehicle, and (ii) identifying threat characteristics of the one or more objects indicative of the threat level to the vehicle, wherein identifying the threat characteristics includes identifying a pose of a person in relation to the vehicle, a biometric signature of the person, and a presence of secondary objects held by the person; and controlling the vehicle to provide a response to the surveillance event according to the threat type and the threat level. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification