This technology relates to a networked video management and recording system, and more specifically, a networked video management system for recording video.
Networked video management and recording systems exist to facilitate the streaming, recording and viewing of video data over a network. Many of these systems may include a network video recorder (NVR) or a digital video recorder (DVR). An NVR may be a software application that records video data on a digital medium. NVRs may be typically executed on a dedicated computer device embedded with a digital medium configured to store the NVR and recorded video data, and a processor to execute the NVR. A DVR may be a hardware device that records video data on a digital medium included on the hardware device. While NVRs connected directly to a video capture camera or tuner, a DVR may be connected to a network. A DVR encodes video data while an NVR receives processed and encoded video data for a network camera device. NVRs and DVRs may be commonly deployed in video surveillance systems. There exists a need to develop hardware and/or software solutions for networked video management systems that may be cost effective and flexible with high performance.
NVRs and DVRs may be commonly used in network video management and recording systems. These systems may be commonly deployed in video surveillance systems. As part of the deployment, the NVRs and/or DVRs (with associated hardware) may be installed at the surveillance site and may be configured to store video data on the devices at the site. On-site storage of video data may be relatively expensive because of infrastructure and maintenance costs associated with NVRs and DVRs. Moreover, there may be difficulties viewing the stored video data remotely from NVRs and DVRs.
The following variations may be drawn to a networked video management and recording system that may include a video client application that may be executed from a video gateway device, typically residing at a client site, such as, a video surveillance site. The video client application may be configured to transmit video data from the video gateway device to a cloud instance. The video data may be transmitted to the cloud instance through a secure hypertext transfer protocol (HTTPS) connection.
As shown
Each video gateway device 22a and 22b may be configured to communicate between networks 12 and 16 using one or more protocols. Network cameras 24a1, 24a2 and 24an may be connected to video gateway device 22a. Network cameras 26b1, 26b2 and 26bn may be connected to video gateway device 22b. While three network cameras may be shown connected to each of video gateway devices 22a and 22b, the number of network cameras connected to each may be significantly scalable. The number of network cameras may only be limited based on hardware specifications and operating system limitations. The number may be about 100 using a relatively low powered device. In one variation, a network camera may include, without limitation, a lens, an image sensor, a processor, and memory. The memory may be configured to store firmware and video data, e.g., video sequence recordings. The firmware may include computer instructions that perform functions when the instructions may be executed by the process. These functions may include, without limitation, networking functions, video processing functions and video analysis functions. A network camera typically may have its own IP address so that it may be connected to a network through a wireless or wired connection. The network cameras 26a and 26b depicted in
Video gateway modules 22a and 22b each include memory configured to video client applications 8. The video client application 8 may be programmed in a run-time environment. The run-time environment may be JavaScript, for example, node.js. respectively. Video client application 8 include instructions when executed by a processor included in each video gateway modules 22a and 22b perform video streaming functions and other functions as set forth herein.
Server network 16 may include application containers. The application containers may be used to deploy and run distributed applications without launching an entire virtual machine for each application within the container. Each of the containerized applications may be executed on a single host and may be configured to access the same operating system (OS) kernel. Each application container may include a set of runtime components, e.g., files, environment variables and libraries, to perform application functions upon execution of the runtime components. In one or more variations, the set of runtime components to execute in an application container may be an image. A container engine deploys these images on server network 16 or another host. In one or more variations, the engines may be Kubernetes engines.
Web service proxy container 30 may be in communication with web service client containers 32a and 32b. Virtual camera containers 34a and 34b may be in communication with web service client containers 32a and 32b, respectively. Virtual camera container 34a may be in communication with recorder container 36a, thumbnails container 38a, and analytics container 40a. Virtual camera container 34b may be in communication with recorder container 36b, thumbnails container 38b, and analytics container 40b. Data storage medium 42 stores recorded video data received from recorder containers 36a and 36b and thumbnail video data received from thumbnails containers 38a and 38b. Live video transcoding container 44 may be in communication with virtual camera container 34a. Video encoders 46a and 46b may be in communication with data storage medium 42. Application programming interface (API) container 48 may be in communication with video encoders 46a and 46b. Live video transcoding container 44 and API container 48 may be in communication user computers 52a, 52b and 52n through external communication network 50.
Web server proxy container 30 may include a container engine configured to execute a container image to connect user computers 52a, 52b and 52n with network cameras 24a and 26a based on a proxy protocol. The proxy protocol may be configured to carry connection information from the user computers 52a, 52b and 52n to video gateway devices 22a and 22b when those devices requested the connection. User computers 52a, 52b and 52n may use a real time streaming protocol (RTSP). The proxy protocol of the server proxy container 30 may be configured to support RTSP, as well as other protocols, such as real time transport protocol (RTP) or HTTPS. In one or more variations, components of the container image may be programmed in a run-time environment. The run-time environment may be JavaScript, for example, node.js.
At arrow 106, web service proxy container 30 assigns a scan for network cameras to video gateway devices 22a and/or 22b. At arrow 108, video gateway devices 22a and/or 22b perform a scan of client network 12 to determine the presence of any network cameras (e.g., network cameras 24a and 24b). The results of the network scan may be transmitted by video gateway devices 22a and/or 22b to web service proxy container 30, as depicted by arrow 110. Web service proxy container 30 adds available network cameras to an at least one work queue 112 as depicted by arrow 114.
As depicted by arrow 116, recorder containers 36a and/or 36b may be configured to check at least one work queue 112 for available network cameras. In response, the at least one work queue 112 transmits a message to recorder containers 36a and/or 36b including a list of available network cameras, as depicted by arrow 118. After the available network cameras may be transmitted, recorder containers 36a and/or 36b transmits a video request to web service client containers 38a and/or 38b, respectively, as represented by arrow 120. Upon receiving the video data request, web service client containers 32a and/or 32b request a tunnel from web service proxy container 30, as depicted by arrow 122. Upon the web service proxy container 30 receiving the tunnel request, the web service proxy container 30 requests the tunnel from the video gateway devices 22a and/or 22b, respectively, as depicted in arrow 124. In turn, gateway devices 22a and 22b may be configured to establish a tunnel with network cameras, as depicted in arrow 126.
As depicted by arrow 128, the tunnel may be opened between one or more network cameras and video gateway devices 22a and/or 22b. The tunnel may be then offered to web service proxy container 30 by video gateway devices 22a and 22b, depicted by arrow 130. In turn, as depicted by arrow 132, web service proxy container 30 offers the tunnel to web service client containers 32a and/or 32b. As shown by arrow 134, RTSP traffic may be established between one or more network cameras and recorder containers 36a and/or 36b.
In certain variations, when web service proxy container 30 may be notified of a network camera at client site 14 (e.g., at arrow 110), web service proxy container 30 sends a tunnel request to the video gateway devices 22a and/or 22b (e.g., at arrow 124). This tunnel request may be made using the initial connection. Video gateway devices 22a and/or 22b determine if the tunnel request may be valid. If the tunnel request may be valid, then video gateway devices 22a and/or 22b open a second secure protocol connection (e.g., HTTPS connection) to the web service proxy container 30. In one or more variations, the second connection may be upgraded to a websocket connection. This second connection may be used to transmit network traffic between the network camera(s) and recorder containers 36a and/or 36b (e.g., arrow 134).
After the second connection has been opened, a listening port may be opened on server network 16 at web service client containers 32a and 32b. The listening port transmits all traffic it receives from virtual camera containers 34a and 34b to the applicable network camera at client site 14. In one or more variations, only Internet connectivity may be necessary to transmit traffic between network camera(s) and recorder containers 36a and/or 36b. No other network considerations (e.g., firewalls) may be necessary because the video management system 10 initiates Internet connections (e.g., HTTPS connection) to server network 16, e.g., web service proxy container 30. The process associated with web service proxy protocol 100 shown in
Variation 1 may include a product comprising a computer system for networked video management, the computer system comprising at least one computer having non-transitory memory for storing machine instructions that are to be executed by the at least one computer, the machine instructions when executed by the at least one computer may implement functions. The functions may include compiling a list of available network cameras on a network in at least one work queue; transmitting a message to at least one recorder container from the work queue including a list of available network cameras; transmitting a video request to at least one web service client container; receiving the video request at the at least one recorder containers; requesting a tunnel from a web service proxy container; receiving the tunnel request at the web service proxy container; requesting the tunnel from at least one video gateway device; and establishing the tunnel with the available network cameras.
Variation 2 may include a product as set forth in variation 1, wherein compiling a list of available network cameras in at least one work queue further may comprise checking the at least one work queue for available network cameras.
Variation 3 may include a product as set forth in any of variations 1 or 2, wherein the network may comprise a client-side network; a server network virtually residing on a cloud instance; and wherein the client-side network and the server network may be in communication with one another over the network.
Variation 4 may include a product as set forth in any of variations 1-3, wherein the at least one computer having non-transitory memory for storing machine instructions may be at least one server side computer.
Variation 5 may include a product as set forth in any of variations 1-4 and may further comprise recording video data from the available network cameras.
Variation 6 may include a product as set forth in any of variations 1-5 and may further include automatically buffering any input or output of data in the tunnel via the web service client container.
Variation 7 may include a method comprising a computer system for networked video management, the computer system comprising at least one computer having non-transitory memory for storing machine instructions that are to be executed by the at least one computer, the machine instructions when executed by the at least one computer may implement functions. The functions may include checking a work queue for available network cameras; transmitting a message to at least one recorder container from the work queue including a list of available network cameras; transmitting a video request to at least one web service client container; requesting a tunnel from a web service proxy container; requesting the tunnel from at least one video gateway device; and establishing the tunnel with the available network cameras.
Variation 8 may include a method as set forth in variation 7, wherein compiling a list of available network cameras in at least one work queue may further comprise checking the at least one work queue for available network cameras.
Variation 9 may include a method as set forth in any of variations 7 or 8, wherein the network may comprise a client-side network; a server network virtually residing on a cloud instance; and wherein the client-side network and the server network may be in communication with one another over the network.
Variation 10 may include a method as set forth in any of variations 7-9, wherein the at least one computer having non-transitory memory for storing machine instructions may be at least one server side computer.
Variation 11 may include a method as set forth in any of variations 7-10 and may further comprise recording video data from the available network cameras.
Variation 12 may include a method comprising a computer system for networked video management, the computer system comprising at least one computer having non-transitory memory for storing machine instructions that are to be executed by the at least one computer, the machine instructions when executed by the at least one computer may implement functions. The functions may include compiling a list of available network cameras on a network in at least one work queue; requesting a tunnel from a web service proxy container; receiving the tunnel request at the web service proxy container; requesting the tunnel from at least one video gateway device; establishing the tunnel with the available network cameras; and recording video data from the available network cameras.
Variation 13 may include a method as set forth in variation 12, wherein compiling a list of available network cameras in at least one work queue may further comprise checking the at least one work queue for available network cameras.
Variation 14 may include a method as set forth in any of variations 12 or 13, wherein the network may comprises a client-side network; a server network virtually residing on a cloud instance; and wherein the client-side network and the server network may be in communication with one another over the network.
Variation 15 may include a method as set forth in any of variations 12-14, wherein the at least one computer having non-transitory memory for storing machine instructions may be at least one server side computer.
Variation 16 may include a method as set forth in any of variations 12-15 and may further comprise transmitting a message to at least one recorder container from the work queue including a list of available network cameras prior to requesting a tunnel from a web service proxy container.
Variation 17 may include a method as set forth in any of variations 12-16 wherein establishing the tunnel with the available network cameras may further comprise transmitting network traffic between the available network cameras and at least one recorder container via a secure hypertext transfer protocol connection.
As required, detailed variations of the present invention are disclosed herein; however, it is to be understood that the disclosed variations may be merely exemplary of the invention that may materialize in various and alternative forms. The figures may not be necessarily to scale; some features may be exaggerated or minimized to show details of particular components. Therefore, specific structural and functional details disclosed herein may be not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.
While variations may be described above, it is not intended that these variations describe all possible forms of the invention. Rather, the words used in the specification may be words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention. Additionally, the features of various implementing variations may be combined to form further variations of the invention.
This application claims the benefit of U.S. Provisional Application No. 62/735,631 (DICE 0166 PRV) filed Sep. 24, 2018.
Number | Name | Date | Kind |
---|---|---|---|
6954859 | Simerly | Oct 2005 | B1 |
7685292 | Kinsella | Mar 2010 | B1 |
10205913 | Smith | Feb 2019 | B2 |
10243997 | Desai | Mar 2019 | B2 |
10785511 | Lopez Hernandez | Sep 2020 | B1 |
20010043571 | Jang | Nov 2001 | A1 |
20040028391 | Black | Feb 2004 | A1 |
20080288986 | Foster et al. | Nov 2008 | A1 |
20110280540 | Woodman | Nov 2011 | A1 |
20120098969 | Wengrovitz | Apr 2012 | A1 |
20120162445 | Kim et al. | Jun 2012 | A1 |
20130198829 | Bund | Aug 2013 | A1 |
20140232874 | Meyer | Aug 2014 | A1 |
20150022666 | Kay et al. | Jan 2015 | A1 |
20150188949 | Mahaffey | Jul 2015 | A1 |
20160036944 | Kitchen et al. | Feb 2016 | A1 |
20160125245 | Saitwal | May 2016 | A1 |
20160127691 | Bokowski | May 2016 | A1 |
20170039841 | Wilson | Feb 2017 | A1 |
20170070361 | Sundermeyer | Mar 2017 | A1 |
20170118127 | Finkelstein | Apr 2017 | A1 |
20180144263 | Saxena | May 2018 | A1 |
20180197387 | Dawes | Jul 2018 | A1 |
20180219976 | Decenzo et al. | Aug 2018 | A1 |
20180270066 | Doyon et al. | Sep 2018 | A1 |
20190163559 | Takahashi | May 2019 | A1 |
20200099727 | Dice | Mar 2020 | A1 |
20200099849 | Dice | Mar 2020 | A1 |
20200099961 | Dice | Mar 2020 | A1 |
20200356618 | Shribman et al. | Nov 2020 | A1 |
Number | Date | Country |
---|---|---|
2001084839 | Nov 2001 | WO |
2019043687 | Mar 2019 | WO |
Entry |
---|
Final Office Action in U.S. Appl. No. 16/578,552, dated Jul. 2, 2021, 28 pages. |
Ubl et al., “Introducing WebSockets: Bringing Sockets to the Web”, Published: Oct. 20, 2010, Downloaded: Jun. 3, 2020, Website: https://www.html5rocks.com/en/tutorials/websockets/basics/, 8 pages. |
Jabeen et al., “Security System Using an IP Camera in Cloud Computing”, Year: 2017, 5 pages. |
Number | Date | Country | |
---|---|---|---|
20200099849 A1 | Mar 2020 | US |
Number | Date | Country | |
---|---|---|---|
62735631 | Sep 2018 | US |