Systems and methods for automated cloud-based analytics for security and/or surveillance
First Claim
Patent Images
1. A surveillance system, comprising:
- at least one server computer configured for network-based communication with a plurality of remote input devices having input capture mechanisms, wherein the plurality of remote input devices are not registered with the at least one server computer; and
wherein the at least one server computer includes at least one processor and a memory storing instructions, wherein the instructions are executable by the at least one processor to cause the at least one server computer to—
receive, via a network, inputs captured by the unregistered remote input devices that correspond, based on time and locations of the unregistered remote, input devices, to at least one predetermined surveillance environment, surveillance event, or surveillance target;
authenticate the inputs; and
analyze the authenticated inputs based on at least one predetermined surveillance profile for at least one surveillance environment, surveillance event, or surveillance target to determine a status of security.
10 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for virtualized computing or cloud-computing network with distributed input devices and at least one remote server computer for automatically analyzing received video, audio and/or image inputs for providing social security and/or surveillance for a surveillance environment, surveillance event, and/or surveillance target.
118 Citations
20 Claims
-
1. A surveillance system, comprising:
-
at least one server computer configured for network-based communication with a plurality of remote input devices having input capture mechanisms, wherein the plurality of remote input devices are not registered with the at least one server computer; and wherein the at least one server computer includes at least one processor and a memory storing instructions, wherein the instructions are executable by the at least one processor to cause the at least one server computer to— receive, via a network, inputs captured by the unregistered remote input devices that correspond, based on time and locations of the unregistered remote, input devices, to at least one predetermined surveillance environment, surveillance event, or surveillance target; authenticate the inputs; and analyze the authenticated inputs based on at least one predetermined surveillance profile for at least one surveillance environment, surveillance event, or surveillance target to determine a status of security. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for providing surveillance, the method comprising:
-
receiving, at least one server computer, inputs from unregistered remote input devices via the network, the at least one server computer is configured for network-based communication with a plurality of remote input devices having input capture mechanisms, wherein the plurality of remote input devices are not registered with the at least one server computer; authenticating the inputs from the unregistered remote input devices at locations and time corresponding to at least one predetermined surveillance environment, surveillance event, or surveillance target; and analyzing the inputs, at the at least one server computer, based on at least one surveillance profile for at least one surveillance environment, surveillance event, or surveillance target to determine a status of security. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for providing surveillance, the method comprising:
-
capturing one or more inputs via a mobile computing device, wherein the one or more inputs are associated with at least one surveillance environment, surveillance event, or surveillance target; and transmitting, from the mobile computing device, the one or more inputs to a remote server computer, wherein the mobile computing device is not registered with the remote server computer, and wherein the remote server computer is configured to (a) authenticate the one or more inputs from mobile computing devices in which time and location of the mobile computing devices correspond to at least one surveillance environment, surveillance event, or surveillance target, and (b) analyze the one or more inputs based on at least one surveillance profile for the at least one surveillance environment, surveillance event, or surveillance target to determine a status of security. - View Dependent Claims (19, 20)
-
Specification