Security cameras are increasingly important for both enterprises and consumers. All levels of government are promoting installation of cameras to address fears of crime. Liability insurers may raise rates on customers who cannot document that their premises are controlled. By high complexity image sequences the present invention includes high resolution digital photographs, lower resolution moving images in the form of a series of video frames, meta-data about the time, place, and conditions of the image, and derived data from quantitative metrics of the images and compressed low resolution extracts from images.
Internet Protocol (IP) network digital cameras are known as an accepted solution for security and monitoring. Utilizing IP networks instead of dedicated video connections to a local server dramatically improves system flexibility and can reduce connectivity and management complexity. Conventional IP network camera system design requires “logging in” to each camera. Typically, each camera implements a website for user access.
Conventional implementations require extensive network application and system engineering and only result in transfer of limited amounts of information. For example it is observed by the inventors that configuration of each network environment consists at least of opening ports, mapping addresses, managing a difficult maintenance and operations model to be assured that the system is working when needed, and addressing security concerns. For example, is the equipment on premises vulnerable to theft or damage, can end users properly configure the network and the specific camera device, what steps are needed to easily record and analyze the video.
To allow live access to cameras, a user should be able to configure firewalls if external access is to be allowed and to configure an IP address resolution service such as a dynamic domain name system (DNS) application. Because the solution depends on an occasional user to define and configure each security installation, deployed solutions have been known to exhibit very poor security such as unintended publicly viewable webcams.
Conventional video security systems do not enable proactive monitoring of their status. End users occasionally discover when an event occurs in their premises, that their system was not functioning correctly and that they do not have the desired critical information despite having made investments into both cameras and recording systems. Since video monitoring systems are typically not core to the business of most enterprises, but supportive, the resources allocated to maintain the system are frequently inadequate, insufficient, or lack the proper expertise to maintain the system effectively. This results in many video systems being effectively turned off after a period of time as the cost and complexity of maintaining the system overwhelms the day to day benefits. Only the largest governmental or private enterprises have continuous human monitoring of all cameras.
The challenge of maintaining operational systems has been addressed in other domains effectively by adopting a “service model” where minimal equipment is onsite and a centralized service provides functionality to a large pool of users. Video monitoring has historically been unable to use this model effectively due to the high bandwidth required to effectively record usable quality video. While this bandwidth can be addressed in local area networks, a service model with centralized recording requires video to be sent over a wide area network such as the Internet, and such connection may be costly and typically limited. For example many business have traditionally had “T1” connectivity, which is bidirectional at about 1 megabit per second. A single camera with high quality video in traditional implementations uses 2-3 megabits of bandwidth, making a conventional service based model impractical.
The benefits of a service based model would be significant. One key benefit is the ability to use shared resources across a larger number of customers. This amortizes the cost of equipment, monitoring and maintenance, allowing very high levels of service at manageable costs. In the area of equipment and management, it is known a single logical storage volume, potentially made up of a very large number of physical volumes, can be shared amongst a large number of users if there are sufficient safeguards for privacy. Using a single large logical storage volume allows for significant individual variance in usage patterns to be efficiently addressed. A single large logical storage volume also allows additional reliability and maintenance investments to be amortized over the entire user set, significantly increasing reliability and reducing costs.
These storage models have been optimized in a computational architecture commonly called “cloud computing”. In cloud computing a very large number of machines and a very large amount of logical storage is made available in an on-demand basis to a large body of customers. Customers can increase and decrease the amount of computational resources allocated to them on a demand basis. Each computation resource is some version of a virtual machine, which can then be further partitioned into individual user computation needs as outlined above. Cloud computing also provides cloud storage, where a very large amount of storage is made available on a demand basis, allowing customers to allocate and de-allocate storage as needed.
It is known in the art that processors as disclosed in the conclusion adapted by software programs provide means.
We define an asset to be a full record of data that elaborates an event as defined by a policy transmitted to an event recordation client from the event recordation server. Non limiting examples of assets include high resolution digital images or video streams but could be audio streams, detailed data or logs. We define a reference to be a summary of an asset that is relatively compact. Non-limiting examples of references include an event type and a time stamp, a low resolution image of a face, license plate, or a photograph or a text report such as generated by voice recognition, character recognition, object recognition, pattern recognition, or facial recognition codes.
Thus it can be appreciated that what is needed is a server apparatus which supports immediate timely upload of references and delayed, and optional upload of assets according to demand, policies, and analysis clients operating on references. Thus it can be appreciated that what is needed is a server apparatus which makes deployment, maintenance, and operation of IP network cameras or other sensory capture devices much less complex. Analog and digital radio transceivers are alternate communication channels which are not proprietary ie. can be monitored by unauthorized observers.
Within the scope of the present patent application we define an event as the collection of meta-data and assets which represent the recordation of an occurrence of interest at a point of recordation terminal (PORT). The present invention comprises a secure event server comprising:
to retrieve assets from at least one event recordation (capture) client,
The present invention comprises a secure sensory stream event server comprising:
The invention also includes a location server and a storage manager circuit,
The invention also includes an analysis server coupled to analysis clients. In an embodiment, an analysis server provides access to references, meta-data, and assets to an analysis client which may be a person or a program performing such non-limiting examples of analysis as follows: an image or character recognition function, a facial recognition function, object permanence or impermanence detection or motion detection. In an embodiment, an analysis server comprises a display server circuit, to decrypt video assets for authenticated users, to show a video stream for a selected event, to show a plurality of scaled, still images for a plurality of events.
This server provides seamless access to assets which may be in any one of a plurality of states. It provides using a location server, command server, and storage server:
This server stores assets encrypted and selectively decodes assets on demand at either server or analysis client depending on analysis client capabilities.
This server supports event recordation clients which are point of recordation terminals (PORTs) which utilize only PORT initiated transactions for both assets and command interactions. This server comprises a switchboard to allow multiple servers to track status of connection, to issue commands on command channel, and to influence asset data transfer channel by sending policies.
This server automatically manages PORT configurations, including managing software configuration, dynamic status, service configuration, user preferences, and computational algorithms.
A highly secure event server receives and stores encrypted assets and references to those assets over a non-proprietary communication channel. A system selectively decrypts assets to authenticated mutually unconscious users, and retrieves, decrypts and serves certain assets from high-volume storage, distributed storage, or in transit. The method controls a plurality of recordation clients and a plurality of analysis engines transmitting policies and commands, requesting upload of assets, and obtaining status solely by receiving client initiated sessions. In an embodiment, a recordation client is a camera. In an embodiment, a recordation client is a microphone. In an embodiment, a recordation client is a measurement instrument. In an embodiment, a recordation client is the engine and control surface parameters of a vehicle such as a train, plane, car, or spacecraft.
An embodiment of the invention is an apparatus coupled to a low-bandwidth communication channel, the channel coupled to a plurality of at least one of a microphone and a camera, the apparatus adapted to receive a compact audio sample or a low resolution still image representative of a larger digital stream stored at the microphone or camera.
An embodiment of the invention further comprises a circuit to respond to at least one of a microphone and a camera with an instruction to upload a stream of data.
An embodiment of the invention is an apparatus comprising
In an embodiment of the invention the assets and references comprise representations of chunks of data which represent meaningful partition of a data stream.
In an embodiment of the invention the asset storer circuit is adapted to process data as chunks are received to improve performance and latency in handling large data streams.
In an embodiment of the invention the chunks comprise meaningful sensory groupings.
In an embodiment of the invention a meaningful sensory grouping is at least one frame of video.
In an embodiment of the invention a meaningful sensory grouping is at least one sample of audio.
In an embodiment of the invention a communication channel comprises a circuit adapted to perform instructions specified by Internet Protocol standard.
In an embodiment of the invention a communication channel comprises a circuit adapted to perform instructions specified by TCP/IP standard.
In an embodiment of the invention a communication channel comprises a circuit adapted to perform instructions specified by hypertext transfer protocol standard.
In an embodiment of the invention a communication channel comprises a circuit adapted to perform instructions specified by hypertext transfer protocol standard POST method.
In an embodiment of the invention a communication channel comprises a circuit adapted to perform instructions specified by hypertext transfer protocol standard POST method chunk based transfer encoding.
In an embodiment of the invention the apparatus further comprises
In an embodiment of the invention the apparatus further comprises:
In an embodiment of the invention the apparatus further comprises
In an embodiment of the invention the apparatus further comprises an analysis server coupled to at least one of an analysis client and an analysis process. The client or process performs an evaluation of each reference to determine if it is not of further interest or if the event should be elaborated and the referenced asset should be retrieved for additional analysis, the analysis server comprising a processor adapted by software instructions providing
In an embodiment of the invention a sensory stream comprises orientation.
In an embodiment of the invention a sensory stream comprises temperature.
In an embodiment of the invention a sensory stream comprises pressure.
In an embodiment of the invention a sensory stream comprises acceleration.
In an embodiment of the invention a sensory stream comprises electro-magnetic field.
In an embodiment of the invention a sensory stream comprises audio.
In an embodiment of the invention a sensory stream comprises video.
An embodiment of the invention comprises a secure video stream event server comprising:
In an embodiment of the invention a video stream assets is an encrypted video stream asset whereby confidentiality is protected over a public communication channel.
In an embodiment of the invention the capture server circuit further comprises a circuit or processor adapted by software instructions:
An embodiment of the invention comprises a method for operating a system,
In an embodiment of the invention a system is a secure system, and the method comprising authenticating authorized users and encrypting and decrypting references and assets for authenticated authorized users.
In an embodiment of the invention assets are encrypted assets and the method further comprises receiving and storing encrypted assets.
In an embodiment of the invention the method further comprises storing a decryption key for an assets, authenticating an authorized user before providing a decryption key and one of transmitting the decryption key to a user or decrypting an asset for an authenticated authorized user.
In an embodiment of the invention further comprises the following processes:
In an embodiment of the invention the method further comprises the steps following:
The server is adapted to operate coupled through a non-proprietary communication channel to an event recordation client comprising
In an embodiment the server apparatus, comprising a processor adapted by software encoded on computer readable media, further provides, using a location server, a command server, and a event recordation server:
In an embodiment the apparatus further provides means for policy distribution to non-proprietary communication channel attached event recordation apparatus by a processor adapted by a program product and a network interface.
In an embodiment the means for policy distribution comprises a software update circuit providing code to define meta-data to be uploaded.
In an embodiment the means for policy distribution comprises a software update circuit providing code to define an event to be recorded.
In an embodiment the means for policy distribution comprises a software update circuit providing code to define an asset to be stored and transmitted.
In an embodiment the apparatus further provides means for quantifiably provable provenance through
The invention comprises a method for operating a non-proprietary communication channel attached event recordation asset server comprising:
The present invention comprises a method for operating an event recordation system provisioning a quantifiably provable provenance process comprising the steps of:
In an embodiment the method further comprises on an event recordation client apparatus:
wherein digitally signing mathematically combines the identification of the event recordation client apparatus, the time and date, and the content of the asset in a way that any modification is quantifiably detectable,
The present invention comprises a method for operating a event server apparatus, the apparatus comprising a command server, a network interface, a storage manager, an event recordation server; the method comprising the steps:
The present invention comprises a method for operating an event server apparatus, the apparatus comprising a command server, a network interface, a storage manager, an event recordation server; the method comprising the steps:
In an embodiment the method further comprises the step of in processing an analysis server request for an asset, responding to a client request with a command to priority upload an asset related to the reference whereby an asset already in transit by bandwidth shaped upload is completed by priority upload.
In an embodiment the asset is digitally signed within the event recordation client apparatus for quantifiably provable provenance the method further comprises the steps:
In an embodiment whereby the asset is received and stored in encrypted format within the event recordation client apparatus for privacy and not decrypted until accessed by authenticated analysis client the method further comprises the steps:
In an embodiment the asset is both encrypted for privacy and digitally signed for provenance by the method further comprising the steps:
In an embodiment an event further comprises a server recognized event which is initiated by a process within the server further comprising the steps:
In an embodiment the invention comprises a network attached event recordation server comprising:
In an embodiment the invention comprises a non-proprietary communication channel attached event recordation asset server apparatus comprising
wherein said event recordation server responds to a client initiated session to provide status, transmit references and assets, and obtain commands and
wherein said storage manager circuit maintains location information for every asset among three classes: in transit between the recordation client and the server, stored at the storage server, or stored at the event recordation client.
The invention comprises a method for operating an event recordation system over a non-proprietary communication channel comprising a quantifiably provable provenance process comprising the steps of:
The invention comprises an event server apparatus comprising:
In an embodiment the apparatus further provides means such as a processor coupled to a network interface, for transmitting an update to a event recordation client apparatus comprising configuration for determining an event, performing analysis, uploading meta-data, and transmitting a reference.
In an embodiment the apparatus further provides means such as a command server and a network interface for forcing an immediate event determination to a selected event recordation client apparatus.
In an embodiment the apparatus further comprise an authentication and decryption circuit,
In an embodiment the apparatus further comprise
In an embodiment the command server comprises a circuit to
In an embodiment, the invention comprises a method for operating a system,
In an embodiment the method for operating a non-proprietary communication channel attached event recordation asset server further comprises distributing a policy to a non-proprietary communication channel attached event recordation apparatus wherein a policy is a computer executable instruction to adapt a processor to transform data tangibly encoded on computer readable media.
In an embodiment the policy determines an event based on object recognition rules.
In an embodiment the policy determines an event based on facial recognition rules.
In an embodiment the policy determines an event based on object placement or movement.
In an embodiment the policy determines an event based on duration of occupancy within a part of an image field.
In an embodiment the policy determines an event based on a repetition of motions.
In an embodiment the policy determines an event based on motion detection and time of day & day of week.
In an embodiment the policy determines which meta data is transmitted by type of event.
In an embodiment the policy determines if a low resolution video frame is included in a reference.
In an embodiment the policy determines if a high resolution image is included in an asset.
In an embodiment the policy determines the immediacy of transmitting an asset to a server.
In an embodiment the policy determines the immediacy of transmitting a reference to a server.
In an embodiment the apparatus further comprises means such as a circuit, software, or processor adapted by a program product. for transmitting an update to a event recordation client apparatus configuration for determining an event, performing analysis, uploading meta-data, and transmitting a reference.
In an embodiment the apparatus further comprises means for forcing an event determination to a selected event recordation client apparatus.
The present invention comprises a secure event server comprising:
In an embodiment the analysis server comprises a circuit:
In an embodiment the analysis server comprises a circuit:
In an embodiment the secure video stream event server further comprises:
In an embodiment the secure video stream event server further comprises:
In an embodiment the secure video stream event server further comprises:
In an embodiment the secure video stream event server further comprises a processor adapted by software to provide
In an embodiment the secure video stream event server further comprises a processor adapted by software to provide means for searching and triggering on values and properties of events and meta data.
In an embodiment the secure video stream event server further comprises a processor adapted by software to provide means for selecting and grouping a combination of events and annotating the group.
Referring now to
Referring to
Referring now to
In an embodiment, the method further comprises
Referring to
Referring now to
Referring now to
The present invention is a method for operating a system comprising,
The method comprises the following processes:
In an embodiment, the method further comprises
In an embodiment, a system comprises
In an embodiment, the system further comprises
In an embodiment, the apparatus comprises at least one event recordation server coupled to both the command server and to the storage server, an event recordation server comprising:
In an embodiment, the apparatus further comprises
The method of operating a location server comprises
The method of operating a location server further comprises:
In a preferred embodiment, the method comprises
In an embodiment, the apparatus further comprises
In an embodiment, the method further comprises
In an embodiment, the method further comprises
In an embodiment, the apparatus further comprises
In an embodiment, the apparatus further comprises a summarizer coupled to a display server and a high-volume storage.
In an embodiment, the method further comprises
In an embodiment, the method further comprises
In an embodiment, the apparatus further comprises
In an embodiment, the apparatus further comprises
In an embodiment, the method further comprises
In an embodiment, the method further comprises
The present patent application discloses a highly secure shared event server receiving and storing encrypted assets and references to those assets over a non-proprietary communication channel. This system selectively decrypts and transmits references and assets to authenticated mutually unconscious users, and retrieves, decrypts and transmits certain assets from high-volume storage, distributed storage, or in transit. The method provides for controlling a plurality of event recordation terminals and a plurality of analysis engines, transmitting policies and commands, requesting upload of assets, and obtaining status solely by receiving client initiated sessions.
The present invention may be easily distinguished from conventional video surveillance systems by serving cameras as clients and receiving hypertext transfer protocol POST method requests. The present invention may be easily distinguished from conventional video surveillance systems by using public networks between the camera and the server and encrypting each cameras video streams with a private key unique to each camera and storing the encrypted videos streams and only decrypting the video streams using a public key upon demand of a user. The present invention may be easily distinguished from conventional video surveillance systems by allocating bandwidth and distributing a bandwidth policy to each camera which autonomously uploads references and video stream assets according to the bandwidth policy. The present invention may be easily distinguished from conventional video surveillance systems by reallocating bandwidth among all cameras when a user requests a video stream asset from a certain camera.
The present invention may be easily distinguished from conventional systems by serving cameras as clients and receiving hypertext transfer protocol POST method requests. The present invention may be easily distinguished from conventional systems by using non-proprietary communication channels between the camera, microphone, or measurement instrument and the server and encrypting each sensory streams with a key unique to each capture device and storing the encrypted sensory streams and only decrypting the sensory streams upon demand of a user. The present invention may be easily distinguished from conventional systems by allocating bandwidth and distributing a bandwidth policy to each PORT which autonomously uploads references and assets according to the bandwidth policy. The present invention may be easily distinguished from conventional systems by reallocating bandwidth among all PORTs when a user requests a sensory stream asset from a certain PORT.
The present invention may be easily distinguished from conventional systems by its isolation of the user from management over the physical location of assets. Assets are automatically moved among and retrieved from the server, the point of recordation or in-flight to the server. To enjoy the economy of using non-proprietary communication channels and high-volume storage but still provide the best security, the invention encrypts data from the point of recordation through storage and only decrypts it exclusively for an authenticated user. A further distinguishing security advantage is passively receiving client initiated sessions from the point of recordation terminals for all management, configuration, and data transfer channels.
The present invention is easily distinguished from conventional system by allowing one or more PORTs to function effectively over lower bandwidth Internet connections and with less impact on other applications using the connection than conventional solutions, while providing effective and timely access to all events recorded by the PORT.
The present invention is easily distinguished from conventional systems by at least:
It is distinctly pointed out that a conventional network security solution such as Secure Sockets Layer Certificates protects only during the transport and fails to accomplish the objective of the present invention. A sensory asset transported by SSL would be stored at the server in unprotected form vulnerable to viewing by unauthorized persons. Nor does an SSL certificate establish a chain of evidence or quantifiably provable provenance from a specific camera, microphone, or measurement instrument as the origin of a video stream. Re-encrypting or signing the asset at the server after transport encryption and decryption would fail to provide provenance and ensure security.
The techniques described herein can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them to provide means for the following:
The techniques described herein can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them to provide means for the following:
The techniques described herein can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The techniques can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
Method steps of the techniques described herein can be performed by one or more programmable processors executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by, and apparatus of the invention can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). Modules can refer to portions of the computer program and/or the processor/special circuitry that implements that functionality.
Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in special purpose logic circuitry.
A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention. For example, other network topologies may be used. Accordingly, other embodiments are within the scope of the following claims.
This application is a CIP of Ser. No. 12/551,239 filed Aug. 31, 2009 A SHARED SCALABLE SERVER TO CONTROL CONFIDENTIAL EVENT TRAFFIC AMONG RECORDATION TERMINALS, ANALYSIS ENGINES, AND A STORAGE FARM COUPLED VIA A PUBLIC NETWORK U.S. Pat. No. ______ issued ______ by the present inventor which is incorporated by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 12551239 | Aug 2009 | US |
Child | 12578008 | US |