EP4483347A1 - Image-surveilled security escort - Google Patents
Image-surveilled security escortInfo
- Publication number
- EP4483347A1 EP4483347A1 EP23710168.8A EP23710168A EP4483347A1 EP 4483347 A1 EP4483347 A1 EP 4483347A1 EP 23710168 A EP23710168 A EP 23710168A EP 4483347 A1 EP4483347 A1 EP 4483347A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- image
- surveilled
- computing device
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19647—Systems specially adapted for intrusion detection in or around a vehicle
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
Definitions
- the present disclosure relates generally to security systems and methods, and more specifically, to image-surveilled security systems and methods.
- An example implementation includes a method comprising receiving, by a computing device, a request for providing image-surveilled security escort for a user to reach a destination. The method further includes determining, by the computing device, whether a security event is detected in image-surveilled data associated with the destination. The method further includes providing, by the computing device, a notification indicative of whether the security event is detected in the image-surveilled data associated with the destination.
- Another example implementation includes an apparatus comprising a memory and a processor communicatively coupled with the memory.
- the processor is configured to receive a request for providing image-surveilled security escort for a user to reach a destination.
- the processor is further configured to determine whether a security event is detected in image-surveilled data associated with the destination.
- the processor is further configured to provide a notification indicative of whether the security event is detected in the image-surveilled data associated with the destination.
- a further example implementation includes an apparatus comprising means for receiving, by a computing device, a request for providing image-surveilled security escort for a user to reach a destination.
- the apparatus further includes means for determining, by the computing device, whether a security event is detected in image-surveilled data associated with the destination.
- the apparatus further includes means for providing, by the computing device, a notification indicative of whether the security event is detected in the image-surveilled data associated with the destination.
- Another example implementation includes a computer-readable medium storing instructions executable by a processor.
- the instructions when executed, cause the processor to receive a request for providing image-surveilled security escort for a user to reach a destination.
- the instructions when executed, further cause the processor to determine whether a security event is detected in image-surveilled data associated with the destination.
- the instructions when executed, further cause the processor to provide a notification indicative of whether the security event is detected in the image-surveilled data associated with the destination.
- the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims.
- the following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed, and this description is intended to include all such aspects and their equivalents.
- FIG. 1 is a schematic diagram of an example system for image-surveilled security escort, according to some aspects
- FIG. 2 is a block diagram of an example computing device which may implement all or a portion of any system or component in FIG. 1, according to some aspects;
- FIG. 3 is a block diagram of example components of a computing device which may implement all or a portion of any system or component in FIG. 1 configured for image-surveilled security escort, according to some aspects;
- FIG. 4 is a flow diagram of an example method of image-surveilled security escort, according to some aspects
- FIG. 5 is a flow diagram of another example method of image-surveilled security escort, according to some aspects.
- FIG. 6 is a flow diagram of a further example method of image-surveilled security escort, according to some aspects.
- Some present aspects provide automated security escort functionality using one or more image surveillance devices (e.g., cameras).
- an image-surveilled security escort system in a parking lot ensures that a user is notified of any suspicious activity in the vicinity of their parking spot, and optionally monitors the vicinity and sends an alert if a security event occurs while the user is travelling to their vehicle.
- the user checks in at a kiosk.
- the kiosk may take a picture of the user to determine their parking spot by matching the user picture to surveillance footage of the parking lot.
- the user may enter their parking spot information (e.g., spot 65) via a user interface on the kiosk.
- the user interface on the kiosk notifies the user of any unusual activity detected around their vehicle.
- the user interface on the kiosk may show a path to the vehicle which avoids other people.
- some or all of the functionality of the kiosk may be implemented via a user device of the user.
- the user may have an application (app) installed on their phone, in which case the user may initiate security escort functionality on their user device from their car to the kiosk or to a security checkpoint, e.g., the lobby of a building.
- the user interface of the kiosk asks the user if they would like to enroll in a check-in process configured to ensure that the user reaches the parking spot safely. If yes, the user is asked to send a message (e.g., a text message) to an on-screen code / number provided on a user interface of the kiosk.
- the kiosk also requests a check-in time period from the user. If the checkin time expires without receiving a check-in message from the user, the image- surveilled security escort system may send an alert to a security entity (e.g., a guard at the parking lot), and may optionally provide video footage of the user walking to their vehicle. Alternatively and/or additionally, if the check-in time expires without receiving a check-in message from the user, the image-surveilled security escort system may send an alert to a user device of the user.
- a security entity e.g., a guard at the parking lot
- the image-surveilled security escort system performs complementary / automated site safety functions. For example, many people may not feel comfortable walking alone to their vehicle or other destination, e.g., walking alone in a parking lot at night.
- the image-surveilled security escort system ensures that the user reaches their vehicle / destination safely and notifies the user of suspicious activities detected near where they parked. Therefore, the image-surveilled security escort system may make the user feel safer when traveling to their parking spot.
- an image-surveilled security escort system 100 includes a kiosk 112 configured for providing image-surveilled security escort to a user 108 that has parked their vehicle 106 at a parking spot 104 in a parking lot 102 surveilled by one or more security cameras 110.
- a sign 116 may be posted at the kiosk 112 to inform the user 108 about the functionality provided by the image-surveilled security escort system 100 through the kiosk 112, so that before returning to the vehicle 106, the user 108 may stop by the kiosk 112 to obtain safety information and/or arrange for automated image-surveilled security escort to the vehicle 106.
- the sign 116 may read: “Parking Lot Video Surveilled Escort. Stop by for any safety alerts in the vicinity of your parking spot. Arrange for video surveilled escort to your parking spot with check-in.”
- a camera 114 in the kiosk 112 upon visiting the kiosk 112, takes a picture of the user 108.
- a user device 128 of the user 108 e.g., a user cell phone
- the user device 128 may take an image of the user 108, etc. Further details of the various example aspects are described below.
- the image-surveilled security escort system 100 looks up the parking spot 104 of the vehicle 106 of the user 108 based on detection of the user 108 in previous video footage of the parking lot 102. The image-surveilled security escort system 100 then performs anomaly detection on the area around the parking spot 104, and the user 108 is presented with safety details / risk level on a user interface 118 of the kiosk 112.
- the user interface 118 may indicate that there is another vehicle next to the parking spot 104 and no one exited that vehicle, people are lingering nearby the parking spot 104, unusual people poses are detected near the parking spot 104 (e.g., people ducking, people laying on the ground, etc.), etc.
- unusual people poses are detected near the parking spot 104 (e.g., people ducking, people laying on the ground, etc.), etc.
- the image-surveilled security escort system 100 provides an option for the user 108 to enroll in a safety check-in process.
- the user interface 118 of the kiosk 112 may display a first message 120 indicating: “To enroll for safety check-in, text “enroll” to the following number 123456.”
- the user 108 may then use a user device 128 (e.g., a mobile device) to text “enroll” to the number indicated in the first message 120, e.g., send a text message to “123456.”
- the user interface 118 of the kiosk 112 may display a second message 122 indicating: “When should we expect you to check in by?”
- the user interface 118 of the kiosk 112 may also provide a first selection 124 for the user 108 to select to check in in 5 minutes
- the image- surveilled security escort system 100 determines that the check-in time has expired. In this case, the image-surveilled security escort system 100 may send an alarm / notification to a security entity 130. Along with the alarm / notification, the image- surveilled security escort system 100 may also send video footage of the user 108 walking to the parking spot 104 in the parking lot 102.
- the security entity 130 may be a guard desk / security operations and may include monitors for displaying the alarm / notification and/or the video footage of the user 108.
- the image-surveilled security escort system 100 searches the video footage of the parking lot 102 as captured by the security camera(s) 110 to automatically determine the parking spot 104 of the user 108 by matching the picture of the user 108 with the video footage.
- the image-surveilled security escort system 100 may use machine learning to perform the matching.
- the image-surveilled security escort system 100 may identify the parking spot 104 based on information stored in a user profile associated with the user 108.
- the user 108 may be preregistered with the image-surveilled security escort system 100, in which case the image-surveilled security escort system 100 may recognize the user 108 by performing facial recognition on the picture of the user 108.
- the user 108 may identify themselves to the image-surveilled security escort system 100 by entering a passcode via the user interface 118, by scanning a quick response (QR) code via a scanner in the kiosk 112, etc.
- QR quick response
- the image- surveilled security escort system 100 may use one or more trained models that are trained to detect any unusual activity around the parking spot 104 and/or in a path from a current location of the user 108 (e.g., from the kiosk 112) to the parking spot 104.
- the image-surveilled security escort system 100 may then notify the user 108 (e.g., via the user interface 118 of the kiosk 112) of potential safety risks as detected in the video footage of the parking lot 102. If unusual activity has been detected in the video footage of the parking lot 102, the image-surveilled security escort system 100 may also display the video footage related to the unusual activity to the user 108 on the user interface 118 of the kiosk 112.
- the user 108 may then choose to contact security personnel (or others) to arrange for a physical / personal escort to the parking spot 104.
- the image- surveilled security escort system 100 may also prompt the user 108 (e.g., via the user interface 118 of the kiosk 112) to indicate whether the user 108 would like to enroll in a check-in process. If the user 108 answers yes to participate in the checkin process, the user 108 is presented with a code or number to send a text message to enroll in the check-in process.
- the image-surveilled security escort system 100 asks the user 108 to provide a check-in time and directs the user 108 to send the text message to the image-surveilled security escort system 100 prior to this time, so that the image- surveilled security escort system 100 knows that the user 108 safely reached the vehicle 106.
- the user interface 118 may provide the first selection 124 for the user 108 to select to check in in 5 minutes and the second selection 126 for the user 108 to select to check in in 10 minutes.
- an input field may be provided on the user interface 118 of the kiosk 112 for the user 108 to enter a user-defined numeric value for the checkin time.
- a frictionless input may be received from the user 108, for example, via a QR code, etc.
- the image-surveilled security escort system 100 may alert a security entity 130 (such as security personnel). Along with the alert, the image-surveilled security escort system 100 may also send further information / relevant data. For example, in some aspects, the image-surveilled security escort system 100 may gather / bundle relevant data that may be useful in case the user 108 does not check in.
- the relevant data may include, for example, the picture of the user 108, a video footage of the user 108 walking to the vehicle 106, a phone number associated with the user 108, license plate information of the vehicle 106 (e.g., if captured by the security cameras 110 or if available in user profile of the user 108), etc.
- the image-surveilled security escort system 100 may send an alarm as well as any of the above relevant data to the security entity 130.
- the security entity 130 (or operations personnel) may review the video footage and determine whether or not a critical safety situation exists, may call the user 108, may physically go to assist the user 108 in person, and/or may notify law enforcement of any issues.
- the image-surveilled security escort system 100 may change an environmental condition in the parking lot 102 and/or around the parking spot 104 to improve safety and/or deter criminals. For example, the image-surveilled security escort system 100 may turn on additional lighting, may activate an audible or visual alarm near the parking spot 104, etc.
- the image-surveilled security escort system 100 may monitor the video footage of the parking lot 102 to determine whether the user 108 reaches the vehicle 106. If the video footage does not indicate that the user 108 has reached the vehicle 106, the image-surveilled security escort system 100 may analyze the video footage to determine where the user 108 is and/or if the user 108 is facing a safety issue. If a distress situation is detected, the image- surveilled security escort system 100 may send an alarm as well as any relevant data to the security entity 130.
- the image-surveilled security escort system 100 may identify potential safety issues based on crime statistics / safety recommendations. However, there may be some situations that are of interest to an individual traveling to their vehicle, but such situations may not necessarily raise any red flags for a team monitoring an entire property. Accordingly, in some alternative or additional aspects, the image-surveilled security escort system 100 may identify potential safety issues by performing video identification of events / situations / objects that have been safety risks to individuals trying to reach their vehicles in the past.
- the image-surveilled security escort system 100 may continue to provide security information after the user leaves the kiosk 112. For example, in an aspect, if the image-surveilled security escort system 100 detects unusual activity after the user leaves the kiosk 112 and walks toward the vehicle 106, the user 108 may receive further information via the user device 128 (e.g., via an app on a cell phone) as the user 108 is walking toward the vehicle 106 in the parking lot 102.
- the user device 128 e.g., via an app on a cell phone
- the image-surveilled security escort system 100 may use a picture of the user 108 taken by the camera 114 in the kiosk 112 to match the user with security footage of the parking lot 102 and identify the user 108 and/or the parking spot 104 of the vehicle 106 of the user 108.
- the present aspects are not so limited.
- the image-surveilled security escort system 100 may use stored information (e.g., stored in a user profile of the user 108) identifying the parking spot 104 used by the user 108 on a regular basis (e.g., for a daily parker).
- the user 108 may explicitly indicate the parking spot 104 to the image-surveilled security escort system 100, for example, by entering an input on the user interface 118 of the kiosk 112.
- the image-surveilled security escort system 100 determines a relevant time period for detecting suspicious activities that are relevant to the safety of the user 108. For example, once the image-surveilled security escort system 100 identifies the user 108 and determines that the user 108 was detected previously in the video footage of the parking lot 102, the image-surveilled security escort system 100 may determine that only the time period between the time the user 108 parked the vehicle 106 at the parking spot 104 and the time the user 108 stops by the kiosk 112 is relevant to the safety of the user 108.
- the image-surveilled security escort system 100 may perform anomaly detection only on the video footage of the parking lot 102 in the time period that is relevant to the user 108. Analyzing only the relevant time period may result in reduced computational cost associated with video footage analysis.
- the image-surveilled security escort system 100 may run a counter that indicates, based on a camera feed, how many people are moving in and out of an area. Using this counter, the image-surveilled security escort system 100 may determine if someone is camping in that area. The image- surveilled security escort system 100 may use machine learning on video footage of the area to determine any criminal activity in the area only if the counter indicates a disparity between people in and out of the area. Limiting the analysis of video footage of the area only to those instances where a disparity exists between people in and out of the area may result in reduced computational cost associated with video footage analysis.
- some or all of the functionality described herein with reference to the image-surveilled security escort system 100 may be implemented by one or more local servers and/or by one or more remote servers.
- the machine learning, image recognition, and/or video footage analysis performed by the image-surveilled security escort system 100 may be executed by remote servers in a cloud system.
- any user profiles, historical safety event detection data and alarms, and/or historical video footage of the parking lot 102 may be stored in a cloud storage.
- the check-in process may be automated.
- the image-surveilled security escort system 100 may automatically register that the user 108 is checked in when the video footage of the parking lot 102 indicates that the user 108 gets into the vehicle 106 or that the user 108 drives out of the parking spot 104.
- automatically registering that the user 108 is checked in would also ensure that the user is not abducted. For example, if the image-surveilled security escort system 100 sends a message to the user 108 if they have not responded in a timely manner, the abductor may respond with a message indicating the user 108 arrived safely.
- the security escort functionality is terminated.
- the image-surveilled security escort system 100 may not include the kiosk 112, in which case the functionality of the kiosk 112 may be provided via an app on the user device 128 of the user 108.
- the app may also recognize the location of the user 108 based on the location of the user device 128. For example, the app may recognize whether the user 108 has entered the parking lot 102, whether the user 108 has parked at the parking spot 104, whether the user 108 is returning back to the parking spot 104, etc. Based on the location of the user 108, the app may automatically initiate image- surveilled security escort functionality and/or notify a compute infrastructure associated with the image-surveilled security escort system 100 in the parking lot 102.
- the user 108 may indicate, via the app on the user device 128, that the user 108 has parked the vehicle 106.
- the current location of the user device 128 identifies the parking spot 104.
- the app may initiate a check-in process to determine whether the user 108 reaches the vehicle 106 in time.
- the app on the user device 128 may suggest a walking path to the parking spot 104. If the user 108 does not reach the parking spot 104 in time, the app may send an alarm to the security entity 130 and/or ask the user 108 to indicate, via the app, whether the user 108 is in danger.
- the present aspects may be implemented to provide a security escort system for traveling from point A to point B, for example, in a college campus.
- a user may indicate, e.g., via a user interface of a kiosk or via a user interface of a user device, that the user intends to travel from point A to point B.
- the security escort system may then track the global positioning system (GPS) location of the user device to determine if the user 108 reaches point B in time.
- GPS global positioning system
- the security escort system may send a notification to a security entity for help.
- the security escort functionality is terminated.
- FIG. 2 illustrates an example block diagram providing details of computing components in a computing device 200 that may implement all or a portion of one or more components in an image-surveilled security escort system, a kiosk, a user device, a camera, or any other system or component described above.
- the computing device 200 includes a processor 202 which may be configured to execute or implement software, hardware, and/or firmware modules that perform any functionality described above with reference to one or more components in an image-surveilled security escort system, a kiosk, a user device, a camera, or any other system or component described above.
- the processor 202 may be configured to execute an image-surveilled security escort component 212 to provide image-surveilled security escort functionality as described herein with reference to various aspects.
- the processor 202 may be a micro-controller and/or may include a single or multiple set of processors or multi-core processors. Moreover, the processor 202 may be implemented as an integrated processing system and/or a distributed processing system.
- the computing device 200 may further include a memory 204, such as for storing local versions of applications being executed by the processor 202, related instructions, parameters, etc.
- the memory 204 may include a type of memory usable by a computer, such as random access memory (RAM), read only memory (ROM), tapes, flash drives, magnetic discs, optical discs, volatile memory, non-volatile memory, and any combination thereof. Additionally, the processor 202 and the memory 204 may include and execute an operating system executing on the processor 202, one or more applications, display drivers, etc., and/or other components of the computing device 200.
- the computing device 200 may include a communications component 206 that provides for establishing and maintaining communications with one or more other devices, parties, entities, etc., utilizing hardware, software, and services.
- the communications component 206 may carry communications between components on the computing device 200, as well as between the computing device 200 and external devices, such as devices located across a communications network and/or devices serially or locally connected to the computing device 200.
- the communications component 206 may include one or more buses, and may further include transmit chain components and receive chain components associated with a wireless or wired transmitter and receiver, respectively, operable for interfacing with external devices.
- the computing device 200 may include a data store 208, which can be any suitable combination of hardware and/or software, that provides for mass storage of information, databases, and programs.
- the data store 208 may be or may include a data repository for applications and/or related parameters not currently being executed by processor 202.
- the data store 208 may be a data repository for an operating system, application, display driver, etc., executing on the processor 202, and/or one or more other components of the computing device 200.
- the computing device 200 may also include a user interface component 210 operable to receive inputs from a user of the computing device 200 and further operable to generate outputs for presentation to the user (e.g., via a display interface to a display device).
- the user interface component 210 may include one or more input devices, including but not limited to a keyboard, a number pad, a mouse, a touch-sensitive display, a navigation key, a function key, a microphone, a voice recognition component, or any other mechanism capable of receiving an input from a user, or any combination thereof.
- the user interface component 210 may include one or more output devices, including but not limited to a display interface, a speaker, a haptic feedback mechanism, a printer, any other mechanism capable of presenting an output to a user, or any combination thereof.
- computing device 300 may implement at least a portion of one or more components in FIGS. 1-2 above, and may perform methods 400, 500, and/or 600 such as via execution of image-surveilled security escort component 212 by processor 305 and/or memory 310.
- computing device 300 may be configured to execute methods 400, 500, and/or 600 for performing various aspects of image-surveilled security escort as described herein.
- computing device 300, processor 305, and memory 310 may be the same or similar to computing device 200, processor 202, and memory 204 as described above with reference to FIG. 2.
- the method 400 includes receiving, by a computing device, a request for providing image-surveilled security escort for a user to reach a destination.
- a computing device For example, in an aspect, computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or receiving component 320 may be configured to or may comprise means for receiving, by a computing device, a request for providing image-surveilled security escort for a user to reach a destination.
- the receiving at block 402 may include the image-surveilled security escort system 100 executing the receiving component 320 to receive, e.g., via the user interface 118 of the kiosk 112, a request for providing image-surveilled security escort for the user 108 to reach a destination.
- the kiosk 112 at the parking lot 102 where the user 108 has parked the vehicle 106 comprises the computing device.
- the destination comprises the parking spot 104 in the parking lot 102 where the user 108 has parked the vehicle 106.
- the method 400 includes determining, by the computing device, whether a security event is detected in image-surveilled data associated with the destination.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or determining component 325 may be configured to or may comprise means for determining, by the computing device, whether a security event is detected in image-surveilled data associated with the destination.
- the determining at block 404 may include the image-surveilled security escort system 100 executing the determining component 325 to determine whether a security event is detected in image-surveilled data associated with the parking spot 104 as captured by the security cameras 110 in the parking lot 102.
- determining whether the security event is detected at block 404 comprises applying machine learning to the image-surveilled data to determine whether the image-surveilled data indicates unusual activity in a vicinity of the parking spot 104.
- the method 400 includes providing, by the computing device, a notification indicative of whether the security event is detected in the image- surveilled data associated with the destination.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or providing component 330 may be configured to or may comprise means for providing, by the computing device, a notification indicative of whether the security event is detected in the image-surveilled data associated with the destination.
- the providing at block 406 may include the image-surveilled security escort system 100 executing the providing component 330 to provide, e.g., via the user interface 118 of the kiosk 112, a notification indicative of whether the security event is detected in the image-surveilled data associated with the parking spot 104 as captured by the security cameras 110 in the parking lot 102 in the path from the kiosk 112 to the parking spot 104.
- the method 400 may include providing, responsive to the security event being detected in the image-surveilled data associated with the destination, a preferred path to the destination.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or providing component 330 may be configured to or may comprise means for providing, responsive to the security event being detected in the image-surveilled data associated with the destination, a preferred path to the destination.
- the providing at block 408 may include the image-surveilled security escort system 100 executing the providing component 330 to provide, e.g., via the user interface 118 of the kiosk 112, and responsive to the security event being detected in the image-surveilled data associated with the parking spot 104, a preferred path from the kiosk 112 to the parking spot 104, e.g., to avoid other people or suspicious vehicles (e.g., to avoid a parked car from which no one exited).
- method 500 includes further optional aspects which may be performed in addition to method 400.
- the method 500 may include capturing an image of the user by an image capture device of the computing device.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or capturing component 335 may be configured to or may comprise means for capturing an image of the user by an image capture device of the computing device.
- the capturing at block 502 may include the image-surveilled security escort system 100 executing the capturing component 335 to cause the camera 114 in the kiosk 112 to capture an image of the user 108.
- the user device 128 of the user 108 may capture an image of the user 108 and send the image to the image-surveilled security escort system 100.
- the method 500 may include identifying the parking spot by matching the image of the user with surveillance footage of the parking lot.
- computing device 300, processor 305, memory 310, image- surveilled security escort component 212, and/or identifying component 340 may be configured to or may comprise means for identifying the parking spot by matching the image of the user with surveillance footage of the parking lot.
- the identifying at block 504 may include the image-surveilled security escort system 100 executing the identifying component 340 to identify the parking spot 104 where the user 108 has parked the vehicle 106 by matching the image of the user 108 with surveillance footage of the parking lot 102.
- the user 108 may enter information identifying the parking spot 104 (e.g., a parking spot number), for example, via the user interface 118 of the kiosk 112 or via an app on the user device 128.
- the method 500 may include requesting, via a user interface of the computing device, that the user indicates whether the user needs continued image-surveilled security escort while traveling to the parking spot.
- computing device 300, processor 305, memory 310, image- surveilled security escort component 212, and/or requesting component 345 may be configured to or may comprise means for requesting, via a user interface of the computing device, that the user indicates whether the user needs continued image- surveilled security escort while traveling to the parking spot.
- the requesting at block 506 may include the image-surveilled security escort system 100 executing the requesting component 345 to request, via the user interface 118 of the kiosk 112 or via an app on the user device 128, that the user 108 indicates whether the user 108 needs continued image-surveilled security escort while traveling from the kiosk 112 to the parking spot 104.
- the method 500 may include providing, via the user interface and responsive to the user indicating that the user needs continued image- surveilled security escort while traveling to the parking spot, information identifying a check-in process for the user to check in with the computing device within a predetermined amount of time.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or providing component 330 may be configured to or may comprise means for providing, via the user interface and responsive to the user indicating that the user needs continued image-surveilled security escort while traveling to the parking spot, information identifying a check-in process for the user to check in with the computing device within a predetermined amount of time.
- the providing at block 508 may include the image-surveilled security escort system 100 executing the providing component 330 to provide, via the user interface 118 of the kiosk 112 or via an app on the user device 128, and responsive to the user 108 indicating that the user 108 needs continued image-surveilled security escort while traveling from the kiosk 112 to the parking spot 104, information identifying a check-in process for the user 108 to check in with the image-surveilled security escort system 100 within a predetermined amount of time.
- the user 108 may respond to a text that was sent by the image- surveilled security escort system 100 to the user device 128 of the user 108 (e.g., the user’s phone).
- an app on the user device 128 of the user 108 may provide options for checking in.
- the app on the user device 128 may provide options for clicking on a “good to go” button or “safe” button versus a “help” button.
- the information provided at block 508 may comprise a number for sending a check-in text to check in with the image-surveilled security escort system 100.
- the information provided at block 508 may comprise the check-in text and the predetermined amount of time.
- the providing at block 508 may include the image-surveilled security escort system 100 executing the providing component 330 to request the user 108 to select the predetermined amount of time.
- the method 500 may include starting a timer configured to expire by the predetermined amount of time.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or starting component 350 may be configured to or may comprise means for starting a timer configured to expire by the predetermined amount of time.
- the starting at block 510 may include the image-surveilled security escort system 100 executing the starting component 350 to start a timer configured to expire by the predetermined amount of time as indicated in block 508.
- the method 500 may include determining whether the user checks in with the computing device before the timer expires.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or determining component 325 may be configured to or may comprise means for determining whether the user checks in with the computing device before the timer expires.
- the determining at block 512 may include the image-surveilled security escort system 100 executing the determining component 325 to determine whether the user 108 checks in with the image-surveilled security escort system 100 before the timer expires.
- the method 500 may include sending an alarm to a security entity and/or to a user device of the user, responsive to an absence of a check-in by the user before the timer expires.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or sending component 335 may be configured to or may comprise means for sending an alarm to a security entity and/or to a user device of the user, responsive to an absence of a check-in by the user before the timer expires.
- the sending at block 514 may include the image-surveilled security escort system 100 executing the sending component 355 to send an alarm to the security entity 130 and/or to the user device 128 of the user 108, responsive to an absence of a check-in by the user 108 before the timer expires.
- the computing device comprises the user device 128 associated with the user 108.
- the method 600 may include determining a first geographical location associated with the user device.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or determining component 325 may be configured to or may comprise means for determining a first geographical location associated with the user device.
- the determining at block 602 may include the image-surveilled security escort system 100 executing the determining component 325 to determine a first geographical location associated with the user device 128 of the user 108.
- the first geographical location is a global positioning system “GPS” location of the user device 128 of the user 108.
- GPS global positioning system
- the method 600 may include determining a second geographical location associated with the destination.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or determining component 325 may be configured to or may comprise means for determining a second geographical location associated with the destination.
- the determining at block 604 may include the image-surveilled security escort system 100 using the determining component 325 to determine a second geographical location associated with the destination where the user 108 intends to reach.
- the destination may be the parking spot 104 at the parking lot 102.
- the destination may be a location on a campus.
- the user 108 may be traveling from a first campus building to a second campus building.
- the method 600 may include determining a travel path between the first geographical location and the second geographical location.
- computing device 300, processor 305, memory 310, image- surveilled security escort component 212, and/or determining component 325 may be configured to or may comprise means for determining a travel path between the first geographical location and the second geographical location.
- the determining at block 606 may include the image-surveilled security escort system 100 using the determining component 325 to determine a travel path between the first geographical location associated with the user device 128 of the user 108 and the second geographical location associated with the destination where the user 108 intends to reach, which may be, for example but not limited to, the parking spot 104 at the parking lot 102.
- determining whether the security event is detected at block 404 comprises determining whether the security event is detected in the travel path determined at block 606.
- the method 600 may include providing, on the user device and responsive to the security event being detected in the travel path, an alternate travel path to the destination.
- computing device 300, processor 305, memory 310, image-surveilled security escort component 212, and/or providing component 330 may be configured to or may comprise means for providing, on the user device and responsive to the security event being detected in the travel path, an alternate travel path to the destination.
- the providing at block 608 may include the image-surveilled security escort system 100 executing the providing component 330 to provide, on the user device 128 of the user 108 and responsive to the security event being detected in the travel path, an alternate travel path to the destination.
- the image-surveilled security escort system 100 may cause the user device 128 to provide / display an alternate / safer travel path between the first geographical location associated with the user device 128 of the user 108 and the second geographical location associated with the parking spot 104 at the parking lot 102.
- the image- surveilled security escort system 100 may indicate an abduction.
- a method comprising:
- starting a timer configured to expire by the predetermined amount of time.
- An apparatus comprising:
- a processor communicatively coupled with the memory and configured to perform the method of any one of the above clauses.
- a non-transitory computer-readable medium storing instructions executable by a processor that, when executed, cause the processor to perform the method of any one of the above clauses.
- An apparatus comprising means for performing the method of any one of the above clauses.
- Combinations such as “at least one of A, B, or C,” “one or more of A, B, or C,” “at least one of A, B, and C,” “one or more of A, B, and C,” and “A, B, C, or any combination thereof’ include any combination of A, B, and/or C, and may include multiples of A, multiples of B, or multiples of C.
- combinations such as “at least one of A, B, or C,” “one or more of A, B, or C,” “at least one of A, B, and C,” “one or more of A, B, and C,” and “A, B, C, or any combination thereof’ may be A only, B only, C only, A and B, A and C, B and C, or A and B and C, where any such combinations may contain one or more member or members of A, B, or C.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Navigation (AREA)
- Traffic Control Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/681,458 US20230274551A1 (en) | 2022-02-25 | 2022-02-25 | Image-surveilled security escort |
| PCT/US2023/062451 WO2023164375A1 (en) | 2022-02-25 | 2023-02-13 | Image-surveilled security escort |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP4483347A1 true EP4483347A1 (en) | 2025-01-01 |
Family
ID=93746040
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP23710168.8A Pending EP4483347A1 (en) | 2022-02-25 | 2023-02-13 | Image-surveilled security escort |
Country Status (1)
| Country | Link |
|---|---|
| EP (1) | EP4483347A1 (en) |
-
2023
- 2023-02-13 EP EP23710168.8A patent/EP4483347A1/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12444294B2 (en) | Community security system using intelligent information sharing | |
| US11259165B2 (en) | Systems, devices, and methods for emergency responses and safety | |
| US10854058B2 (en) | Emergency alert system | |
| US8737951B2 (en) | Interactive personal surveillance and security (IPSS) systems and methods | |
| US8368754B2 (en) | Video pattern recognition for automating emergency service incident awareness and response | |
| KR101644443B1 (en) | Warning method and system using prompt situation information data | |
| AU2019295856A1 (en) | Object tracking using disparate monitoring systems | |
| Naved et al. | Artificial intelligence based women security and safety measure system | |
| KR20160074208A (en) | System and method for providing safety service using beacon signals | |
| US20230274552A1 (en) | Image-surveilled security escort | |
| KR101335429B1 (en) | Vehicle integrated monitoring system and providing method thereof | |
| US20230274551A1 (en) | Image-surveilled security escort | |
| US20130258110A1 (en) | System and Method for Providing Security on Demand | |
| US9641965B1 (en) | Method, system and computer program product for law enforcement | |
| KR20160086536A (en) | Warning method and system using prompt situation information data | |
| EP4483347A1 (en) | Image-surveilled security escort | |
| US20220032968A1 (en) | Neighborhood watch system, and method of implementing same using autonomous vehicles | |
| JP2021164008A (en) | Information processing methods, information processing devices, programs and information processing systems | |
| CN106297181A (en) | Extension the tinkle of bells based on GPS and the special method escorting pattern is realized in security panel | |
| WO2024036045A1 (en) | Image-surveilled security escort | |
| KR20160032464A (en) | Social security network method and system | |
| WO2015188231A1 (en) | Enforcement services techniques | |
| TWI606426B (en) | System and method for personal circumference surrounding safety notification | |
| US20240331392A1 (en) | Systems and methods for detecting individuals engaged in organized retail theft |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
| 17P | Request for examination filed |
Effective date: 20240916 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| DAV | Request for validation of the european patent (deleted) | ||
| DAX | Request for extension of the european patent (deleted) | ||
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
| 17Q | First examination report despatched |
Effective date: 20250826 |