Patent application number | Description | Published |
20080316315 | METHODS AND SYSTEMS FOR ALERTING BY WEIGHING DATA BASED ON THE SOURCE, TIME RECEIVED, AND FREQUENCY RECEIVED - Methods, systems, and apparatus for monitoring, alerting, and acting, including the following steps. Input data is received from one or more sensory devices. One or more data weights are determined for the input data based on a weight corresponding to a source of the input data, a weight corresponding to a time the input data was received, and a weight corresponding to a frequency that the input data was received. A set of rules is evaluated based on the input data and the data weights. One or more actions, including a hierarchy of one or more alerts, are activated based on the result of the evaluation of the rules. | 12-25-2008 |
20090002157 | AUDIO ANALYSIS, STORAGE, AND ALERTING SYSTEM FOR SAFETY, SECURITY, AND BUSINESS PRODUCTIVITY - An audio surveillance, storage, and alerting system, including the following components: One or more audio sensory devices capture audio data having attribute data representing importance of the audio sensory devices. One or more audio analytics devices process the audio data to detect audio events. A network management module monitors network status of the audio sensory devices and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more events weighted by the attribute data of the device used to capture the data. Finally, an alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. This invention may be used to help fight crime and help ensure safety procedures are followed. | 01-01-2009 |
20090135007 | ALERTING SYSTEM FOR SAFETY, SECURITY, AND BUSINESS PRODUCTIVITY HAVING ALERTS WEIGHTED BY ATTRIBUTE DATA - The present invention is an alerting system having one or more sensors for capturing sensory data, one or more processors and one or more memories having program code to (1) capture sensory data from the one or more sensors; (2) capture attribute data representing information about the sensors used to capture the sensory data; (3) process the sensory data from the one or more sensors to detect primitive events in the sensory data; (4) correlate two or more primitive events, the primitive events weighted by the attribute data of the sensors used to capture the sensory data; and (5) perform one or more actions based on the correlation performed in the correlating step. The system may also be connected to one or more legacy systems, such as FBI, Interpol, or other criminal database systems. | 05-28-2009 |
20100023418 | METHODS AND SYSTEMS FOR COLLABORATIVE PURCHASE OF GIFTS - The present invention is a computer-based method and system for coordinating the collaborative selection and purchase of a gift given by any number of gift contributors to a recipient. The gift shopping system maintains updated information on the remaining balance for gift's purchase amount The collaborative gift shopping system processes monetary transactions for each gift contributor until the full purchase amount has been reached. When the full purchase amount is reached by the collaborating gift contributors, the gift order is processed for delivery to the gift recipient. The gift shopping system can send communications to gift contributors each time a contribution towards a gift has been processed. Once the purchase amount of the gift has been reached the gift shopping system can send communications to gift contributors. The gift shopping system can maintain a database for which gifts each recipient has received and/or which gifts are currently accepting contributions to avoid duplicating gifts for that recipient. The gift shopping system can send communications to potential contributors on behalf of gift contributors in the form of invitations to participate in the gift. | 01-28-2010 |
20100125663 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 05-20-2010 |
20100153168 | SYSTEM AND METHOD FOR CARRYING OUT AN INSPECTION OR MAINTENANCE OPERATION WITH COMPLIANCE TRACKING USING A HANDHELD DEVICE - The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection. | 06-17-2010 |
20100321183 | A HIERARCHICAL STORAGE MANAGER (HSM) FOR INTELLIGENT STORAGE OF LARGE VOLUMES OF DATA - The present invention is a video surveillance, storage, and alerting system having the following components. One or more surveillance cameras capture video data having attribute data, the attribute data representing importance of the surveillance cameras. One or more video analytics devices process the video data from one or more of the surveillance cameras and detect primitive video events in the video data. A network management module monitors network status of the surveillance cameras, and the video analytics devices, and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the surveillance cameras used to capture the video data, and network events from the network management module weighted by attribute data of device corresponding to the network event. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. | 12-23-2010 |
Patent application number | Description | Published |
20100185549 | SYSTEM AND METHOD FOR CARRYING OUT AN INSPECTION OR MAINTENANCE OPERATION WITH COMPLIANCE TRACKING USING A HANDHELD DEVICE - The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection. | 07-22-2010 |
20100262688 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack; and (3) Spoofing Attack. A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint of the IP device or its configuration settings, a watermark inserted in the data-stream, and a private key burned into the IP devices' physical memory may be used to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 10-14-2010 |
20110173127 | SYSTEM AND METHOD USED FOR CONFIGURATION OF AN INSPECTION COMPLIANCE TOOL WITH MACHINE READABLE TAGS AND THEIR ASSOCIATIONS TO INSPECTED COMPONENTS - The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database. Disclosed here is a method for configuring a project having one or more installation of assets for use with an industrial inspection compliance system, including the steps of (a) defining an installation and storage area for the project; (b) assigning the assets uniquely into the one or more installation or storage area; (c) segmenting each asset into components; (d) assigning logical inspection points for the project, installations, and the assets; (e) defining inspection criteria for each logical inspection point; (f) assigning tag locations for a machine-readable tag having a unique serial number at or near each logical inspection point; (g) capturing a media sample of each logical inspection point; (h) capturing location coordinates for each logical inspection point; and (i) requiring the collection of data such as a unique machine-readable tag serial number, media sample, location coordinates, and an encrypted security signature to confirm that the inspection actions actually occurred. | 07-14-2011 |
20110202396 | PORTABLE INTERACTIVE MODULAR SELLING ROOM - Disclosed is a portable interactive modular selling room that recreates the home environment in a retail business location to help educate the user for sales and training purposes. The plug and play selling system utilizes standard electrical connectors to allow for seamless integration within a store without the need of electricians or construction contractors. Encompassing all five senses in an interactive environment develops an intellectual and emotional connection with the user which allows the product implementation to demonstrate features and value in a more meaningful and engaging manner over traditional retail environments. The computer system implemented inside of the system encompasses an interaction engine which utilizes sensors and monitoring equipment to record and analyze the user to provide real-time responses and also feedback to a central database for future interaction development. Increased customer satisfaction improves sales which allows for the sales system to remain economically viable. | 08-18-2011 |
Patent application number | Description | Published |
20080278579 | APPARATUS, METHODS, AND SYSTEMS FOR INTELLIGENT SECURITY AND SAFETY - A method and system for intelligent monitoring and intelligent alerting. One or more data inputs are received from one or more systems. A weight is attributed to each data input based on the data input, the source of the data input, and other factors. One or more video inputs are received from one or more video sources. Image analysis is performed on the video data to determine one or more video parameters. The video parameters are assigned one or more weights based on the video source and other factors. A series of rules are evaluated using the data inputs, the video inputs, and their respective weights. An associated action is performed for each rule that is activated. The present invention may be used for various security and safety purposes, including fighting crime, detecting and preventing terrorist activity, and ensuring safety procedures are followed. | 11-13-2008 |
20080297599 | VIDEO DATA STORAGE, SEARCH, AND RETRIEVAL USING META-DATA AND ATTRIBUTE DATA IN A VIDEO SURVEILLANCE SYSTEM - One embodiment is a method of storing video data from a video surveillance system having one or more cameras. Video data is captured from one or more surveillance cameras. Meta-data is automatically generated by performing video analysis on the captured video data from the surveillance cameras. A human operator may manually enter additional meta-data. Attribute data and associated weights, representing information about the relevance of the meta-data, is received. The video data is stored in a hierarchical video storage area; the meta-data, indexed by date and time stamp to the video data, is stored in a meta-data storage area; and the attribute data is stored in an attribute storage area. One or more alerts may be issued based on the past and present meta-data. The video data is secured by encrypting and storing the video data remotely, and audit trails are generated about who and when viewed the video data. | 12-04-2008 |
Patent application number | Description | Published |
20110320389 | SYSTEMS AND METHODS FOR SAFETY AND BUSINESS PRODUCTIVITY - The present invention is a safety and business productivity system having the following components. One or more cameras capture video data having attribute data, the attribute data representing importance of the cameras. One or more video analytics devices process the video data from one or more of the cameras and detect primitive video events in the video data. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the cameras used to capture the video data. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. | 12-29-2011 |
20120226526 | SYSTEMS AND METHODS FOR BUSINESS PROCESS MONITORING - The present invention is a video surveillance, storage, and alerting system having the following components. One or more surveillance cameras capture video data having attribute data, the attribute data representing importance of the surveillance cameras. One or more video analytics devices process the video data from one or more of the surveillance cameras and detect primitive video events in the video data. A network management module monitors network status of the surveillance cameras, and the video analytics devices, and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the surveillance cameras used to capture the video data, and network events from the network management module weighted by attribute data of device corresponding to the network event. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. | 09-06-2012 |
20130222600 | SYSTEMS AND METHODS FOR BUSINESS PROCESS AND SAFETY PROCEDURE MONITORING - The present invention is a method to ensure business processes and safety procedures are followed, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the one or more sensors in a data storage device; processing the sensory data from the sensors to detect primitive events in the sensory data using a computer processor; correlating two or more primitive events to determine one or more correlated events using the computer processor; and performing one or more actions to ensure business processes and safety procedures are followed based on the correlation performed in the correlating step. | 08-29-2013 |