Patent application number | Description | Published |
20080278579 | APPARATUS, METHODS, AND SYSTEMS FOR INTELLIGENT SECURITY AND SAFETY - A method and system for intelligent monitoring and intelligent alerting. One or more data inputs are received from one or more systems. A weight is attributed to each data input based on the data input, the source of the data input, and other factors. One or more video inputs are received from one or more video sources. Image analysis is performed on the video data to determine one or more video parameters. The video parameters are assigned one or more weights based on the video source and other factors. A series of rules are evaluated using the data inputs, the video inputs, and their respective weights. An associated action is performed for each rule that is activated. The present invention may be used for various security and safety purposes, including fighting crime, detecting and preventing terrorist activity, and ensuring safety procedures are followed. | 11-13-2008 |
20080297599 | VIDEO DATA STORAGE, SEARCH, AND RETRIEVAL USING META-DATA AND ATTRIBUTE DATA IN A VIDEO SURVEILLANCE SYSTEM - One embodiment is a method of storing video data from a video surveillance system having one or more cameras. Video data is captured from one or more surveillance cameras. Meta-data is automatically generated by performing video analysis on the captured video data from the surveillance cameras. A human operator may manually enter additional meta-data. Attribute data and associated weights, representing information about the relevance of the meta-data, is received. The video data is stored in a hierarchical video storage area; the meta-data, indexed by date and time stamp to the video data, is stored in a meta-data storage area; and the attribute data is stored in an attribute storage area. One or more alerts may be issued based on the past and present meta-data. The video data is secured by encrypting and storing the video data remotely, and audit trails are generated about who and when viewed the video data. | 12-04-2008 |
20080316315 | METHODS AND SYSTEMS FOR ALERTING BY WEIGHING DATA BASED ON THE SOURCE, TIME RECEIVED, AND FREQUENCY RECEIVED - Methods, systems, and apparatus for monitoring, alerting, and acting, including the following steps. Input data is received from one or more sensory devices. One or more data weights are determined for the input data based on a weight corresponding to a source of the input data, a weight corresponding to a time the input data was received, and a weight corresponding to a frequency that the input data was received. A set of rules is evaluated based on the input data and the data weights. One or more actions, including a hierarchy of one or more alerts, are activated based on the result of the evaluation of the rules. | 12-25-2008 |
20090002157 | AUDIO ANALYSIS, STORAGE, AND ALERTING SYSTEM FOR SAFETY, SECURITY, AND BUSINESS PRODUCTIVITY - An audio surveillance, storage, and alerting system, including the following components: One or more audio sensory devices capture audio data having attribute data representing importance of the audio sensory devices. One or more audio analytics devices process the audio data to detect audio events. A network management module monitors network status of the audio sensory devices and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more events weighted by the attribute data of the device used to capture the data. Finally, an alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. This invention may be used to help fight crime and help ensure safety procedures are followed. | 01-01-2009 |
20090135007 | ALERTING SYSTEM FOR SAFETY, SECURITY, AND BUSINESS PRODUCTIVITY HAVING ALERTS WEIGHTED BY ATTRIBUTE DATA - The present invention is an alerting system having one or more sensors for capturing sensory data, one or more processors and one or more memories having program code to (1) capture sensory data from the one or more sensors; (2) capture attribute data representing information about the sensors used to capture the sensory data; (3) process the sensory data from the one or more sensors to detect primitive events in the sensory data; (4) correlate two or more primitive events, the primitive events weighted by the attribute data of the sensors used to capture the sensory data; and (5) perform one or more actions based on the correlation performed in the correlating step. The system may also be connected to one or more legacy systems, such as FBI, Interpol, or other criminal database systems. | 05-28-2009 |
20100030876 | METHOD, SYSTEM AND APPARATUS FOR DISCOVERING USER AGENT DNS SETTINGS - A method, system and apparatus including receiving a request from a network device, the request including an IP address of said network device, generating and sending to the network device a domain name for locating a device configured to process a DNS query, the domain name corresponding to the IP address, the network device generating and sending a DNS query including the domain name and at least one local DNS setting of the network device to the device configured to the process the DNS query, and the device processing an association between the IP address and the at least one local DNS setting of the network device. | 02-04-2010 |
20100125663 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 05-20-2010 |
20100169975 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 07-01-2010 |
20100321183 | A HIERARCHICAL STORAGE MANAGER (HSM) FOR INTELLIGENT STORAGE OF LARGE VOLUMES OF DATA - The present invention is a video surveillance, storage, and alerting system having the following components. One or more surveillance cameras capture video data having attribute data, the attribute data representing importance of the surveillance cameras. One or more video analytics devices process the video data from one or more of the surveillance cameras and detect primitive video events in the video data. A network management module monitors network status of the surveillance cameras, and the video analytics devices, and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the surveillance cameras used to capture the video data, and network events from the network management module weighted by attribute data of device corresponding to the network event. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. | 12-23-2010 |
20110320389 | SYSTEMS AND METHODS FOR SAFETY AND BUSINESS PRODUCTIVITY - The present invention is a safety and business productivity system having the following components. One or more cameras capture video data having attribute data, the attribute data representing importance of the cameras. One or more video analytics devices process the video data from one or more of the cameras and detect primitive video events in the video data. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the cameras used to capture the video data. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. | 12-29-2011 |
20120226526 | SYSTEMS AND METHODS FOR BUSINESS PROCESS MONITORING - The present invention is a video surveillance, storage, and alerting system having the following components. One or more surveillance cameras capture video data having attribute data, the attribute data representing importance of the surveillance cameras. One or more video analytics devices process the video data from one or more of the surveillance cameras and detect primitive video events in the video data. A network management module monitors network status of the surveillance cameras, and the video analytics devices, and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the surveillance cameras used to capture the video data, and network events from the network management module weighted by attribute data of device corresponding to the network event. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. | 09-06-2012 |
20130222600 | SYSTEMS AND METHODS FOR BUSINESS PROCESS AND SAFETY PROCEDURE MONITORING - The present invention is a method to ensure business processes and safety procedures are followed, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the one or more sensors in a data storage device; processing the sensory data from the sensors to detect primitive events in the sensory data using a computer processor; correlating two or more primitive events to determine one or more correlated events using the computer processor; and performing one or more actions to ensure business processes and safety procedures are followed based on the correlation performed in the correlating step. | 08-29-2013 |