Apparatus and methods for alarm verification based on image analytics
First Claim
Patent Images
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
- receive from an image capture device a first image and a second image both associated with a monitored premise;
generate blob data based on both the first image and the second image;
classify an object in both the first image and the second image based on the blob data to produce a classified object identifier;
detect a criterion of the object based on the classified object identifier, the criterion being unique to the object from within a set of objects;
identify a predefined user authorization profile based on the criterion;
determine whether the object is authorized to access the monitored premise based on the predefined user authorization profile; and
send to a compute device a signal representing an alarm event in response to determining that the object is not authorized to access the monitored premise.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for verification of alarms is disclosed. The method involves receiving an alarm signal trigger associated with an alarm signal, receiving video data from a premise associated with the alarm signal, rapidly analyzing the video data to test for the existence a significant event, and when a significant event exists, sending a representation of a segment of interest of the video data, the segment of interest being associated with the significant event, to a user.
99 Citations
20 Claims
-
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive from an image capture device a first image and a second image both associated with a monitored premise; generate blob data based on both the first image and the second image; classify an object in both the first image and the second image based on the blob data to produce a classified object identifier; detect a criterion of the object based on the classified object identifier, the criterion being unique to the object from within a set of objects; identify a predefined user authorization profile based on the criterion; determine whether the object is authorized to access the monitored premise based on the predefined user authorization profile; and send to a compute device a signal representing an alarm event in response to determining that the object is not authorized to access the monitored premise. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18, 19)
-
-
11. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive from a video capture device a video both associated with a monitored premise and captured during an event time period; detect motion of an object at the monitored premise based on the video; classify, in response to the detected motion, the object as a person; analyze a set of pixels classified as the person to determine an identity of the person; determine, based on a predefined user profile (1) associated with the identity of the person, and (2) indicating an authorization time period during which the person is authorized to access the monitored premise, whether the person is authorized to access the monitored premise during the event time period; and send to a compute device a signal representing, an alarm event when it is determined that the person is not authorized to access the monitored premise during the event time period, the determination that the person is not authorized being based on a comparison of the event time period to the authorization time period. - View Dependent Claims (12, 13, 14, 15, 16, 17, 20)
-
Specification