Self-Configuring and Self-Adjusting Distributed Surveillance System
First Claim
1. A surveillance method comprising:
- providing two or more cameras;
installing the two or more cameras in a target region;
automatically constructing at least one database that includes at least typical transit times between camera locations and transition probabilities between camera locations;
wherein the at least one database is automatically constructed from observations of normal traffic in the target region combined with automatic facial recognition;
performing real-time anomaly identification by comparing real-time surveillance data with the at least one database.
1 Assignment
0 Petitions
Accused Products
Abstract
Improved facial recognition tracking of individuals throughout a space is provided, as is identification of unexpected behavior. The system can configure itself upon setup and adjust to changing conditions, and is able to intelligently reduce the workload on the facial recognition system. Cameras are placed throughout a building and learn what typical traffic within the building looks like. Over time, the system can track multiple users throughout the system and can automatically learn the average time between cameras. A probability function for each camera can also be determined that give probabilities for each camera to camera path. This approach provides for both limiting the bandwidth and processing power required for facial recognition and also allows for behavioral analysis. This system could be implemented as a distributed system of cameras, each performing its own facial recognition and tracking, and/or with distributed cameras combined with central processing for facial recognition.
31 Citations
20 Claims
-
1. A surveillance method comprising:
-
providing two or more cameras; installing the two or more cameras in a target region; automatically constructing at least one database that includes at least typical transit times between camera locations and transition probabilities between camera locations; wherein the at least one database is automatically constructed from observations of normal traffic in the target region combined with automatic facial recognition; performing real-time anomaly identification by comparing real-time surveillance data with the at least one database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification