Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYNCHRONIZED BEACON CRIMINAL ACTIVITY DETERRENT
Document Type and Number:
WIPO Patent Application WO/2020/242467
Kind Code:
A1
Abstract:
Disclosed is a system for deterring criminal activity by providing a visual indication of active surveillance including a time server, a first client device having a first LED and an internal clock, the first client device configured to connect to the time server and synchronize its internal clock with the time server, a second client device having a first LED and an internal clock, the second client device configured to connect to the time server and synchronize its internal clock with the time server, wherein the first client device and the second client device are each configured to be selectively set to a "monitor mode" in which the respective first LEDs of the first client device and the second client device pulse in unison.

Inventors:
HODGE ANDREW (US)
ACKERMAN NATHAN (US)
Application Number:
PCT/US2019/034440
Publication Date:
December 03, 2020
Filing Date:
May 29, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
OWL CAMERAS INC (US)
International Classes:
G08B5/38; F21S10/06; G04C13/00
Domestic Patent References:
WO2016137596A12016-09-01
Foreign References:
US20130094622A12013-04-18
US20100253531A12010-10-07
US20070195939A12007-08-23
US3855587A1974-12-17
US20140241533A12014-08-28
US20080151967A12008-06-26
Other References:
See also references of EP 3935612A4
Attorney, Agent or Firm:
RIBERA, Hector (US)
Download PDF:
Claims:
CLAIMS

1. A system for deterring criminal activity by providing a visual indication of active surveillance, the system comprising:

a time server, the time server including a universal clock signal;

a first client device having a first LED and an internal clock, the first client device configured to connect to the time server and synchronize its internal clock with the universal clock signal;

a second client device having a first LED and an internal clock, the second client device configured to connect to the time server and synchronize its internal clock with the universal clock signal; and

wherein the first client device and the second client device are each configured to be selectively set to a monitor mode, the monitor mode including flashing on and off a first LED according to a pulsing signal based on the internal clock, wherein the first LED of the first client device and of the second client device flash on at substantially the same time.

2. The system of claim 1 wherein each of the first client device and the second client device are further configured to be set to a triggered mode, the triggered mode comprising setting a second LED of each of the first client device and second client device to an“on” state.

3. The system of claim 1 wherein the first client device is configured to receive a“security event message” and, upon receiving the“security event message”, transition to a triggered mode, the triggered mode comprising illuminating with a second LED of the first client device.

4. The system of claim 1 wherein the first client device is configured to detect a security event, and upon detecting the security event, send a security event message and transition to a triggered mode, the triggered mode comprising illuminating a second LED.

5. The system of claim 4 wherein the second client device is configured to receive the security event message and to transition to the triggered mode upon receiving the security event message.

6. The system of claim 5 wherein the first client device is configured to send the security event message to a message server.

7. A system for deterring criminal activity by providing a visual indication of active surveillance, the system comprising:

a first client device having a front-facing camera, a rear-facing camera, a beacon LED, an illumination LED, and an internal clock; wherein the first client device is configured to receive a synchronized time from a timer server, the synchronized time for synchronizing a plurality of internal clocks in a plurality of client devices,

wherein the first client device is further configured to update the internal clock in accordance with the synchronized time; and

wherein the first client device is configured to pulse the beacon LED in unison with the plurality of client devices in accordance with the internal clock and the plurality of internal clocks.

8. The system of claim 7 wherein the first client device is configured to detect a security event and, in response, activate its illumination LED.

9. The system of claim 7, wherein the first client device is configured to detect a security event and, in response, send a security event message to a message server.

10. The system of claim 8, wherein the first client device is further configured to send the security message to the message server for triggering the plurality of client devices to activate a respective illumination LED in each client device of the plurality of client devices.

11. A system for deterring criminal activity by providing a visual indication of active surveillance, the system comprising:

a time server configured to provide a synchronization time to a plurality of client devices for synchronizing a plurality of internal clocks, wherein each client device of the plurality of client devices includes an internal clock for controlling the pulsing of a beacon LED upon entering into a monitor mode; and

a message server configured to receive a security event message from a first client device from the plurality of client devices, the security event message including a location of the first client device, and further configured to send a notification to a subset of the plurality of client devices upon receipt of the security event message, the subset of client devices determined based on a proximity to the location of the first client device, wherein the beacon LED in the plurality of client devices pulse at substantially the same time based on the internal clock of each client device.

12. The system of claim 11 wherein the message server is configured to receive the security event message from the first client device of the plurality of client devices upon the first client device detecting a security event and turning on an illumination LED.

13. The system of claim 11 wherein the message server is further configured to receive a location information from the plurality of client devices, and further configured to determine the subset by comparing the location information with the location of the first client device

14. The system of claim 13 wherein comparing the location information with the location of the first client device is based on a determination of a distance between the first client device and each of the client devices in the plurality of client devices, and further wherein the message server is configured to send the notification to the subset of client devices for which the distance is less than a threshold amount.

15. The system of claim 14 wherein the notification comprises a trigger indicating to the subset of client devices to activate an illumination LED in response to receiving the notification.

16. A method for deterring criminal activity by providing a visual indication of active surveillance, the system comprising:

synchronizing an internal clock of a first client device with a universal clock of a time server;

synchronizing an internal clock of a second client device with the universal clock of the time server

setting the first client device and the second client device to a“monitor mode”; and

pulsing a first LED of the first client device in unison with a first LED of the second client device.

17. The method of claim 16 further comprising:

setting the first client device and the second client device to a“triggered mode”; and

setting a second LED of each of the first client device and second client device to an“on” state.

18. The method of claim 16 further comprising:

receiving a“security event message” at the first client device;

setting the first client device to a“triggered mode”; and

illuminating with a second LED of the first client device.

19. The method of claim 16 further comprising:

detecting a security event at the first client device;

sending a security event message;

setting the first client device to a“triggered mode”; and

illuminating a second LED of the first client device.

20. The method of claim 19 further comprising:

receiving the security event message at the second client device; setting the second client device to the“triggered mode”; and

illuminating a second LED of the second client device.

21. The method of claim 20 wherein the sending of the security event message is first sent to a message server and subsequently forwarded to the second client device.

Description:
INTERNATIONAL PATENT APPLICATION

TITLE

Synchronized Beacon Criminal Activity Deterrent.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. Pat. App. No. 15/864,342 filed January 8, 2018, which is a continuation-in-part of and claims priority to PCT Patent Application No.

PCT/US17/50991, entitled“Video-Based Data Collection, Image Capture and Analysis

Configuration,” filed September 11, 2017, which claims the benefit of U.S. Provisional

Application No. 62/412,764, filed October 25, 2016, the contents of which are hereby

incorporated by reference in their entirety.

BACKGROUND

The present invention relates generally to a system for deterring criminal activity, and more particularly, to a system for providing an overt visual signal that an area is under surveillance. Good surveillance systems are helpful to provide security and protection of people and property. For example, businesses and homeowners regularly install security cameras around their businesses, homes, and other property to provide video surveillance so that in the event of a burglary, theft, invasion, damage to property, or other criminal activity the captured video data can be used to identify the perpetrators and help piece together what happened. Sometimes the captured video data is useful and may help the police successfully identify and eventually apprehend those involved in the criminal activity.

With the availability of low-cost digital video cameras, residential security camera systems have become popular, typically with local or cloud-based video recording and storage services.

However, to-date, typical home security camera systems record at relatively low resolution, making it difficult to discern relevant details of any event that may have been captured. Also, although many current home security cameras provide a source of illumination for nighttime use, such illumination, which is usually in the form of infrared LEDs, is rarely effective beyond 20 feet. In addition, most criminal events take place at night, and more importantly, most criminals are either aware of the field of view of security cameras that may be prominently located around the home and criminals make efforts to avoid being recorded by them and also often wear clothing that obscures facial features and other identifying details so that even if a security camera did happen to record a criminal in action, the recorded footage would not reveal useful information, other than perhaps a general description of the criminal miscreant (e.g., height, build, etc.).

Another environment where security cameras are often employed is parking lots and garages.

For example, in commercial parking garages, where drivers pay to park their cars for a period of time, security cameras are usually employed to provide surveillance. However, typically the cameras only cover the main entrances and exits of the building and possibly some general views of each floor. A criminal may easily bypass the field of view of the minimal camera coverage and break into cars that are not being surveilled or are outside or far in the field of view of the cameras. For example, when the owner of a vehicle arrives at a restaurant that provides valet parking services, he or she relinquishes his or her vehicle to the valet attendant, essentially a stranger, and receives a small paper receipt in return. The attendant drives off to park the vehicle at some unknown location, typically a garage, while the owner tries to stay focused on the upcoming fine food experience. Needless to say, all vehicle owners experience a level of stress and concern regarding any valet service because of the unknown. If they receive their vehicle damaged or with items missing from within, or even with evidence that their car was driven outside the garage, it's a hassle to file a claim and difficult to prove fault.

Similarly, when people park in open free parking lots of the type typically provided adjacent shopping centers or businesses, even though there are usually security cameras positioned throughout the area, the footage of these cameras are not available to the owners of the cars parked in the lot.

One potential solution to these parking-related issues is the use of video cameras in vehicles. So-called "dash-cams" or "car-cams" are typically mounted to the windshield or dashboard of a vehicle and are used to record forward-facing video of the path of travel as the vehicle moves. Various features are becoming more popular in current dash-cam models, such as including a cabin-view camera, and motion activation, which could be used to capture video of break-in or theft events inside the vehicle. For example, when a driver of a dash-cam enabled vehicle enters a parking lot, the dash-cam (if continually powered) may continue to record its field of view, even when the car is parked. This recorded viewing angle may prove useful if an event were to happen to the owner's vehicle inside the camera's field of view. Unfortunately, the vehicle owner would have no recorded information regarding an event occurring outside the camera's field of view because the event would have occurred in the blind-spot of the camera. To help provide a greater field of view, some dash-cam designs employ a 360 degree lens. Although this type of lens does increase the field of view, the view is inherently filled with obstructions, such as most of the vehicle, often include optical artifacts, and may require software to resolve.

Similarly, if an automobile is subject to a forced entry incident (a break in), a car-camera in that car may quickly be stolen, knocked down, or otherwise made inoperative. Also, in the case of an automobile accident, the car-camera itself may become severely damaged or knocked off its mount and be unable to record or "see" the events which take place during and after the impact.

This is unfortunate since important visual evidence occurring after the accident may be lost. In-vehicle camera systems also provide additional features. For example, when travelling on a road, drivers always benefit by knowing what lies ahead of them. Some vehicle systems provide cameras and other sensors to scan the area immediately in front of the vehicle to provide information to the driver and, sometimes, to assist with safety controls, such as to avoid a collision, to stay within the road, or more recently, to provider auto-pilot and self-driving features. However, these systems are limited to the field of view or sense immediately in front of the vehicle. Drivers may resort to other connected systems, such as on-board guidance systems or smartphone applications, to receive additional information about what lies ahead, such as traffic congestion or accidents, road obstructions, or the like, but these apps typically rely on other drivers to actively participate, as they drive to provide the information to be distributed to others using the application. The information often requires the participant to manually input data or manipulate their smartphone. Of course, manually inputting such information is distracting and dangerous to both the driver of one car and the neighboring vehicles and pedestrians. There are no known applications or devices that provide user- selectable real-time visual information of what lies ahead, beyond the line of sight of the driver. Accordingly, there is a need for a system to expand the coverage of an event or area from monitoring video cameras in the area and increase the likelihood that useful video evidence, e.g. of a fleeing suspect, will be obtained and overcome the shortcomings of the prior art.

BRIEF SUMMARY

According to various embodiments of the present invention, a system for deterring criminal activity by providing a visual indication of active surveillance including a time server, a first client device having a first LED and an internal clock, the first client device configured to connect to the time server and synchronize its internal clock with the time server, a second client device having a first LED and an internal clock, the second client device configured to connect to the time server and synchronize its internal clock with the time server, wherein the first client device and the second client device are each configured to be selectively set to a“monitor mode” in which the respective first LEDs of the first client device and the second client device pulse in unison.

In another embodiment, a system for deterring criminal activity by providing a visual indication of active surveillance including a first client device having a front-facing camera, a rear-facing camera, a beacon LED, an illumination LED, and an internal clock, a second client device having a front-facing camera, a rear-facing camera, a beacon LED, an illumination LED, and an internal clock, a time server, wherein the first client device and the second client device are configured to connect to and receive a synchronized time from the timer server and update their respective internal clocks in accordance with the synchronized time, and wherein the first client device and the second client device are configured to pulse their respective beacon LEDs in unison and in accordance with their respective internal clocks.

According to yet another embodiment, a system for deterring criminal activity by providing a visual indication of active surveillance includes a time server, a plurality of client devices, each of the client devices having a front-facing camera, a rear-facing camera, a beacon LED, an illumination LED, and an internal clock, wherein each of the client devices is configured to receive a synchronized time from the time server and update their respective internal clocks consistent with the synchronized time, wherein each of the client devices is configured to be set to a“monitor mode” in which their respective beacon LEDs pulse in accordance with the internal clock.

The features of described in this disclosure, and the manner of attaining them, will become more apparent and the invention itself will be better understood by reference to the following description of the disclosed embodiments taken in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS FIG. l is a schematic showing a plurality of networked client devices and a cloud-based server according to one embodiment;

FIG. 2 is a plan view of a client device according to one embodiment;

FIG. 3 is a plan view of an exemplary vehicle using a client device, mounted to the windshield, according to one embodiment;

FIG. 4 is a plan view of an exemplary neighborhood, including various vehicles and homes, according to one embodiment;

FIG. 5 is a plan view of an exemplary parking lot, showing various parked vehicles, some of which including client devices, according to one embodiment;

FIG. 6 is a plan view of an exemplary parking receipt according to one embodiment;

FIG. 7 is a view of an exemplary parking lot, showing various parked vehicles, some of which include client devices, according to an embodiment;

FIG. 8 is a system diagram according to an exemplary embodiment of the invention; and FIG. 9 is a process flow chart according to an exemplary embodiment of the invention.

The figures depict various example embodiments of the present disclosure for purposes of illustration only. One of ordinary skill in the art will readily recognize form the following discussion that other example embodiments based on alternative structures and methods may be implemented without departing from the principles of this disclosure and which are

encompassed within the scope of this disclosure. DETAILED DESCRIPTION

The Figures and the following description describe certain embodiments by way of illustration only. One skilled in the art will readily recognize from the following description that other embodiments having varying or alternative structures may be implemented without departing from the principles of the disclosure. Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality.

By way of introduction, the present invention relates to a video management system for capturing, storing, authenticating, analyzing, accessing and presenting video files when needed. As described in Applicants’ PCT Patent Application, entitled,“Video-Based Data Collection, Image Capture and Analysis Configuration,” filed September 11, 2017, having serial number, PCT/US17/50991, the system according to the disclosure, manages video data from one or more of a plurality of client devices, each of which has at least one video camera, a processor, memory, several sensors a cellular communication module and a Bluetooth communication module. Each client device is either mobile - mounted to a vehicle, or mounted to a fixed object so that at least one video camera records video data (with a field of view generally covering the forward view of the vehicle in the case of a vehicle mounted client device). The sensors of each client device are configured to generate metadata. The processor associates the metadata with recorded video data and encrypts the data stream. The processor, at prescribed times, transmits the encrypted video and metadata to a cloud-based server using the cellular communication module. The encrypted video files are stored in a cloud-based server for secured access.

Referring to Figs. 1 and 2, and according to a first embodiment of this disclosure, a management system 10 includes an Internet connection (cloud) 11, a network of client devices 12, and a remote server 13. Each client device includes a body 14, a video camera 16, a lens 18 (defining a field of view 20), controlling circuitry 22, video memory 24, RF communication circuitry 26, a source of power 28, and a touchscreen display 29. Controlling circuitry 22 includes a microprocessor 30, processor memory 32, and all other required supporting circuitry and electronic components 34. Parent application, PCT Patent Application No. PCT/US17/50991 (incorporated by reference), describes in more detail a suitable video management system for carrying out the functions described herein. All the internal electronic components of client device 12 are electrically connected to each other in such a way as to allow for their independent and supportive operation as described in the parent application.

According one embodiment of this disclosure, each client device 12 is able to communicate with server 14 and with any other client device 12 within the network. This communication may include transmitting and receiving data and instructions, depending on the particular operation being performed.

As shown in Fig. 3 and according to one embodiment, at least one, but preferably most of client devices 12 are of the type that can be mounted to the dashboard or windshield 35 of a vehicle 36, taking the form of what is commonly referred to as a“car-cam” or a“dash-cam.”

Referring to Figs. 3 and 4 and according to one embodiment of the disclosure, client devices 12 work together to form a network of video recording devices to continuously record and store video data. According to this embodiment, a fixed client device 15 may be securely mounted to a house or building structure 40, as shown in Fig. 4. In such instance, fixed client device 15 is likely not easily accessible and does not include touch-screen display 29. Such fixed client devices 15 will likely be mounted high along an outside wall of the house or building structure 40 and therefore not directly interactive with a user. Fixed client devices 15 are essentially video-footage suppliers to other client devices 12 in the network.

According to one embodiment, if both mobile client devices 12 and fixed client devices 15 are used in a particular network, mobile (or otherwise accessible) client devices 12, which do include touch-screen display 29, will provide a user interface to allow the user to set-up and later operate any fixed client devices 15. In one embodiment, each fixed client device 15 could be owned by a user of a mobile client device 12, such as the owner of a home may have a security surveillance system including several fixed client devices 15 mounted to various parts of his or her house 40 and a mobile client device 12 which is mounted to the windshield 38 of his or her vehicle 40. Together, the fixed and mobile client devices are all part of a subgroup of the larger client network. For example, in one embodiment, all the fixed and mobile client devices owned by a common owner can follow the instructions of the mobile client device 12 of that subgroup. This means that any search requests, as described below, from client devices 12 located outside the subgroup network will be unable to directly reach any of the fixed client devices 15 - only the mobile client device 12.

Regardless, during normal operation, each client device 12 operates independently from the other client devices in the network and continuously records video data from within field of view 20 of lens 18 (and also records audio data and optionally metadata, such as time and date stamp and compass orientation, from the general area using appropriate microphones and sensors, not shown). According to the invention, microprocessor 30 located within each client device runs a suitable object-recognition software program, such as“TensorFlow,” or“Caffe,” to analyze each frame of recorded video, preferably concurrent to it being recorded, extract and then store all known and unknown image classifiers for each frame captured during recording. For example, if, during daytime, a boy runs after a yellow ball in the yard of house 40, a fixed client device 15 will record the event. Microprocessor 30 located within client device 15 will apply object- recognition software to the images as they are being recorded and will recognize the boy as being a boy, the action of running, and a yellow-colored object that is shaped circular, like a ball. This information will be stored in video memory 24, as object classifier data. If stored video data is transmitted (or otherwise transferred to another location), it may include metadata and any classifier data for each frame (or predetermined length) of video. As described below, if any stored video data requires a computer-controlled object-based search, the computer may search the classifier data and the metadata only, since the video has already been analyzed.

According to one embodiment, any search request from any client device 12 in the network can be performed by microprocessor 30 of each client device 12, whereby each client device may search the classifier data and the metadata of the video stored in video memory 24, and also all newly analyzed video (in real-time). Once complete, the search results will be transmitted using RF transmitter circuit 26 to the client device of the requesting party. The transmission for any data, according to this embodiment, may be sent directly to another client device 12, in a peer-to- peer manner, or it may be transmitted first to a cloud-based server 13 over a suitable wireless network service, such as LAN or 4G, either continuously, in response to a request, or at prescribed times. Server 13 may analyze and store any received data and later transmit selective stored data, including stored video data, metadata, classifier data, or search results, to any particular client device 12, portable electronic device, or authorized computer, after verifying permission.

As mentioned above, according to one aspect of the present disclosure, initial object-recognition and object classification work may be preferably performed locally by each independent client device 12 during initial video recording (or shortly thereafter). In this regard, many operations, such as object searching, may be performed efficiently and effectively using only a single client device, or select client devices based on factors related to the object being searched, or all of the networked client devices, simultaneously. By controlling which client devices are enlisted to assist in a search request, the searching becomes quicker, more accurate and more efficient than searches performed using conventional security systems, as described below.

According to one embodiment, cloud-based server 13 is not required to perform many of the operations and functions of the present invention, since client devices 12 are networked and may effectively communicate with each other, in a peer-to-peer manner and perform many functions independently. However, in some cases, being able to have client devices 12 communicate with cloud-based server 13 is beneficial and preferred. Depending on conditions, raw video data may be sent to server 13 without first performing object recognition and without providing any classifier data. In such instance, processors (not shown) at server 13 may use object recognition software to analyze the received raw video data and generate classifier data. By doing this, memory and processor time within each client device 12 may be freed up. As mentioned above, this classifier data may be used to assist in a search request at a later time, as described in greater detail below.

According to one embodiment, by way of example, during an event located within field of view 20 of at least one networked client device 12, some information will be recorded by video camera 16 of at least one client device 12. A user of that particular client device 12 may review recorded footage of the event on touch-screen display 29 and see a section of video that appears to show“objects of interest.” This could be an image of a face of a suspect involved in the event or perhaps a red baseball cap the suspect appeared to be wearing in the captured video. The user decides he needs more footage from other networked devices to help locate him in the neighborhood and warn others of his whereabouts. The user sends out a search request.

According to one embodiment of the invention, the user may instruct the local client device 12 to send out an automatic search request based on the section of video footage that shows the “objects of interest.”

According to one embodiment, microprocessor 30 of local client device 12 transmits the object classifier data of that section of video and other necessary data (such as metadata) to nearby (or all, or select) client devices 12 of the network and instructs those devices to search their respective video memory 24 for any images (or video clips) whose object classifiers match, within a predetermined acceptable level of accuracy, the object classifiers of the search request. Nearby client devices 12 are then instructed to transmit any“hits” from the search back to the local client device 12 for quick review. A hit may include a still image, or a video clip showing a predetermined amount of time before and after the matching object classifier, such as 30 seconds before and after.

The user may then quickly review the received hits and select any that appear to be particularly relevant and use this information to refine the search. The user at this time may further elect additional“objects of interest” from any of the images or video clips of the received hits to help narrow down a secondary revised search. Microprocessors 30 would use the specific object selections made by the user to“fine tune” the secondary searching efforts, likely yielding more accurate results, the second time around. By providing the human user a chance to review video clips from a search and further classify initial search hits by levels of importance allows the computer to fine-tune searching criteria, which will likely improve the accuracy of future searching.

An“event“ may be, for example, a crime in progress, an accident, a party or a social gathering, or may just be a point of interest, such as the Golden Gate Bridge. Alternatively, in one embodiment, the user may initiate a manual search to other client devices 12 on the network for an object of interest that the user captured on his client device 12. The user, as before, simply touches on display 29 of his client device, the object or objects that he wishes to search. For example, the user wishes to find more footage (and the location of that footage) that includes any red baseball caps so he initiates a search by selecting the baseball cap on display 29 of his client device 12 (by touching the baseball cap on the image on the display 29) when it appears during the playback of a recorded video clip. Microprocessor 30 of his local client device 12 is then able to identify the selected object using object recognition software.

His client device 12 then uses RF communication circuitry 26 to send out a search request to select client devices 12 nearby. Microprocessor 30 knows the location and identification of all client devices in the area (either by communicating with server 13, or using RF ranging techniques, such as BLE beacons, or WiFi beacons) and can use this information to select any of them to search their video memory for any footage including a red baseball cap.

According to another embodiment, microprocessor 30 analyzes the object classifier data of the video clip showing the selected object (in the above example, the red baseball cap) to determine its speed and direction of movement (assuming the selected object has moved from the field of view). Once this is determined, microprocessor 30 compares the direction of movement with the locations of networked client devices and their respective fields of view 20 to calculate which client devices are most likely to show the selected object in their stored video footage, based on the movement of the selected object. Since the direction and speed of the object of interest is calculated, and the relative locations of each surrounding client device 12 is known, then an estimated time of arrival (ETA) when the object of interest will enter the field of view 20 of the different surrounding clients devices can also be calculated. The calculated ETA can be used during the search to narrow the data to be searched. Now selected surrounding client devices 12 (or cameras) need only search their respective memories for the object of interest (as defined by classifier data) around the calculated ETA for each particular client device 12.

For example, referring to Fig. 4, if the suspect with the red baseball cap is shown in the video clip running North from house 50 just as the suspect leaves the field of view of local client device 54, microprocessor 30 of the local client device 54 will transmit a search request initially only to networked client devices located North of the local client device 54, around house 56 (to search their respective memories just before and after the calculated ETA for the various known client devices located to the North), in the example shown in Fig. 4. This will speed up the searching process. If no results are found, then the search request will expand to additional client devices in the area. If a rate of speed is known of the object of interest, such as a person or a vehicle, but its direction is either not known, or is expected to change, then the search request can simply be applied to all client devices that encircle the location of the requesting client device 12, again searching their respective memories only a prescribed time before and after the calculated ETA for the first perimeter of client devices 12. If nothing is found, the perimeter can be extended outward. If a client device provides a confirmed“hit”, then the searching algorithm can use the information to update the search request, perhaps to different client devices, depending on any new information, such as a new speed, a new direction of travel, etc.

According to another aspect of one embodiment, any networked client device 12 may send a search request to any other client device 12 in the network, following the instructions of a searching algorithm used by all networked client devices 12. For example, a first client device 12a may initiate a search by instructing a second client device 12b to search for a particular object of interest. If that second client device 12b fails to locate the selected object in its video memory during a similar time period as the original event (as determined by metadata), then the second client device 12b will automatically extend the area of searching by sending out its own search request to additional nearby client devices 12c-12n.

Regardless of the type of search being requested, the user may include additional classifiers which may be included as data on any memory chip. For example, the user may type directly into his or her local client device (or use voice or other form of input) to state that the object of interest is a small dog running East. Microprocessor 30 will be able to convert the inputted description (e.g., text or voice) into computer-understood classifier data and carry out the search request to nearby client devices, in this case, located to the East.

While client devices record video, according to one embodiment, various tags may be applied, either by the driver, through voice, text, or a touch-screen action, or automatically, by continuously using object recognition software on all objects appearing in field of view 20 of camera 16. The user may simply speak, as he or she is driving, an object that he or she sees (and is therefore also recorded by client device 12, such as“sunset,”“Tesla,”“Uncle Bob,” etc.). These tags will cause microprocessor 30 to associate the tag description (i.e., a classifier), with the object that appears on the recorded video tape at that moment by creating a metadata record. Manual and automatically attached tags (subject matter labels) in video metadata allow the system to more efficiently search as it narrows down candidates for joining and sharing device views and captured footage. Automatic tagging allows the object recognition software to identify objects automatically. The user is asked on occasion to confirm that the computer is correct for certain recognitions, such as confirming that the computer correctly recognized Uncle Bob, or the Grand Canyon, etc. The confirmation by a human allows the system using artificial intelligence (AI) algorithms to learn and to increase prediction accuracy over time during future searches and recognition and further decrease search time and processing power required for these systems and operations. Specific combinations of classifier data will be common triggers for automatically applied tags. For example, a detected cluster of orange pixels within a recorded scene may indicate many different objects, but if the orange cluster of pixels is bouncing up and down, this added information narrows the potential objects to a few, including the likely classification of a basketball being bounces on a court.

According to one embodiment, a neural net determines which client devices are most likely to return matches within the timeframe required to search based on several factors, including, for example, which client devices 12 have opted in and which have opted out, the GPS location of the client device at the time of the event, the amount of memory on the different client devices being queried (how much video has been stored in the device’s video memory), the speed of travel of the client device at the time of the event, the direction of travel of the client device at the time of the event, and other suitable factors. Referring again to Fig. 4, if a vehicle 60 with a client device 62 drove past the event location (house 50), at the same time, but was travelling 65 MPH at night, its video footage will be less likely to be helpful.

Once surrounding client devices complete their respective searches of their stored video memory 24, they will each transmit search results back to the local client device which initiated the search request, which will in turn notify the user by using touch-screen display 29, or his or her portable electronic device.

As understood by those of ordinary skill in the art, all data that is transmitted between client devices 12, any portable personal electronic device, and server 13 may be encrypted using any suitable encryption method.

The above-described automatic and manual searching between different client devices 12 of the network may be managed peer-to-peer between any one or more of the microprocessors 30 of different client devices 12 of the network, or by cloud-based server 13. In such instance, and according to one embodiment, a cloud-based object recognition software and a suitable AI software gathers searching information and, as described above, will use the information to determine which client devices 12 of the networked devices would be most likely to have captured a selected object of interest, and will then select those client devices 12 to initiate their respective search.

In some circumstances, there may be advantages to using a cloud-based server 13 to manage the search requests, as well as applying object recognition software to captured video clips. For example, in one embodiment, server 13 may have faster and more powerful processors and greater memory and may also include a larger set of available classifiers, than those found on some client devices 12. This would allow server 13 to identify and search objects of interest more quickly, efficiently, and more accurately. According to another embodiment, a search request, regardless of if it is requested automatically or manually by a user, may first notify the owner of the selected client device 12 to gain permission to access the memory of their client device. The owner being asked only has to select an option on his or her touch-screen display, or portable electronic device to respond. The owner of the selected client device may review the request more closely, including the video clip taken by the requestor’s device (if there is one), and any comments provided by the requestor, such as“I’m looking for my dog and need your help - may I have access to your cameras for the last 20 minutes? If so, please click‘YES’.”

According to one embodiment, since any potential evidence is time-sensitive, system 10 automatically perform a preliminary background search of video memory 24 of any selected client devices 12 before notifying the owners of those devices to get their permission. This quick preliminary search allows the system to perform a quick cursory review of the metadata and classifier data files for any match relating to the requested search data. If a match is found, or a suggestion that there could be a match is found, then the owner of that specific client device 12 would be notified and permission requested to collect and transmit the relevant data. As is further described in the parent application, in one embodiment, the preliminary search results, positive or negative, may be used by the software program of system 10 to reassess the search situation to determine which other client devices, if any, should be interrogated to yield more accurate results. It is preferred that no search results (or any data) from any client device 12 that was preliminarily searched (i.e., without first notifying the owner) is saved in any memory to respect the owner’s privacy. In basic terms, this approach can be summarized as one computer will search another computer for data relevant to a search request. If relevant data is found, the searching computer will ask for permission to copy the relevant data. If there is no relevant data found, then no data will be copied or otherwise saved. In any case, no data will be reviewed by a human, unless permission is given. By performing a preliminary search, the owner of a client device only has to be notified for permission to share data if it is determined that there is a high likelihood that that person’s device has captured footage relevant to a legitimate share request. According to one embodiment, system 10 allows for all users of client devices (during their initial setup) to manage how future permission requests are handled in advance so that they do not have to be bothered. For example, each user may opt to always grant any received permission, or always deny any received permission, always allow or deny, depending on the neighbor who is asking, or other combinations of conditions. If denying, in one embodiment, the system may remind the user that they will only be asked for permission to share their video data if the system 10 has determined that their device contains content that is relevant to the search request. System 10 will also remind the user the importance of an open system among device owners and that an open system, where every member of the network shares footage when asked allows the overall surveillance system to work best for everyone.

If permission is granted in response to a search request, a more detailed and thorough search may be performed. First, client device 12 is instructed to transmit the relevant portions, as defined in the search request (such as requesting footage taken between 4:30 pm to 6:30pm on November 3, 2017) of the video memory 24 of client device 12 to server 13. Thereafter, server 13 would perform the more detailed review and search of the metadata and classifier data, based on the details provided by the initial search request, such as specific“objects of interest.” If a match is found during the detailed search, server 13 would notify the search requester and transmit the relevant search results to his or her client device 12 or portable electronic device for their review. According to one embodiment, cloud server 13 uses artificial intelligence (AI) to learn more about matches and to help improve the accuracy and efficiency of future searches. When a match is found on a shared video clip, system 10 may use AI to generate additional classifiers based on less obvious nearby objects to help provide more information for any additional searching. For example, if a suspect was captured in the video of one client device wearing a red baseball cap, and then it is revealed that footage from a shared device shows a man wearing a red baseball cap running North and also wearing a gold watch. System 10 would identify the gold watch as a supporting object classifier and would now search for a man heading North wearing a red baseball cap and/or a gold watch (just in case he removes his cap as he runs). Also, as mentioned above, if system 10 locates a match, but the match is within a range of uncertainty, such as for example 90% certain, system 10 may ask for human assistance to validate the proposed matches. System 10 uses information uncovered from shared video data and the location information of the shared client devices 12 to continue to identify additional batches of searchable client devices 12 based on which devices found matches (e.g., devices North of the target all returned matches, whereas devices located West, East, and South found none). Also, system 10 may use object recognition, tracking software, and AI algorithms to determine not only the classifier associated with the object of interest, but details of how that object of interest is moving across the field of view of the particular camera. System 10 will effectively predict the trajectory of the object of interest from the field of view of the initial client device to other areas in the neighborhood and based on this trajectory, system 10 (or the initial client device 12) will query nearby client devices that intersect with the calculated path or trajectory of the object of interest. For example, if a suspect is captured running North, across a field of view of a first client device 12, that client device and determine that there is a high chance that the suspect may appear in the respective field of views of client devices 12 (including fixed cameras 15) located to the North of the first client device. Therefore, client device would initially only query those client devices located to the North and would not bother the client devices located to the East, West, and South.

According to one embodiment, system 10 will eventually become sufficiently trained to identify which client devices of the network may have captured relevant footage by using an iterative process that involves having a human verify which of any matching video footage from various client devices actually match the requested search information. System 10 can then learn and fine-tune the search criteria based on the human only selecting those that are 100% matching, and also learn from the proposed matches that were not selected, essentially asking“Why were the false-matches considered a match?” System 10 can then use this information to improve the accuracy and efficiency of future searching. By having human input, the object-recognition and searching system can be improved over time. At the same time, the system is capable of learning to detect false positives provided by the algorithms and heuristics and may refine them to improve accuracy in future searches.

When a match is found during a search, system 10 extracts all relevant video clips surrounding the actual matching frames and may include still-frames of the matching content, and all associated metadata and classifier data. The information is then encrypted and transmitted to all parties involved, including the person who initially requested the search and the person who provided the shared content. All members of the network could also be notified that a successful share has occurred. In one embodiment, for example, a reward system may be provided to benefit networked users who share footage and those who actively request searches. Such a system would incentivize frequent sharing activity within the network which in turn, would increase the effectiveness and range of the surveillance capabilities of the system.

According to another aspect of one embodiment, the network of client devices 12 of system 10 can be positioned throughout a neighborhood, for example. Different sub-groups of client device owners may accept in advance to work together by effective joining the video output with each other so that access to each others’ cameras is always available, following a pre-approved sharing agreement. For example, two neighbors can“connect” their client devices 12 with each other so that cameras 16 of one house can watch the other house, and vice versa. In the case that client devices 12 are mobile, such as car-cams, then each car-cam in the sub-group would be able to detect the proximity of other car-cams that are part of the same sub-group when they are nearby. This could be done using GPS, Bluetooth, or similar communication technology. If at least one client device 12 of a sub-group is mobile, then they can automatically connect and share video at any location, as long as at least two client devices are in proximity of each other (proximity may be, for example, located within 100 to 300 feet, but can be different distances depending for example on communication technology, density of housing, and the like). In addition, in this embodiment, more than one client device 12 may be moving at the time. So, in one embodiment, if two client devices are driving near each other on a highway, then the driver of each vehicle can activate their client device to view the output of the other driver’s client device 12. The two drivers can essentially video-chat with each other, in real time, and record the conversation. A method for linking nearby client devices 12 includes providing a first video camera (a first client device 12) in a first area for creating a first data. Then, providing a second video camera (a second client device 12) for creating a second data wherein at least the second video camera is mobile and is entering the general area near the first video camera.

Then, either the first or the second camera (or server 13) detects if the two cameras are located in proximity to each other. If so, then data from at least one video camera is automatically transmitted to the other. Data is transmitted only if each owner approves of the transmission. According to this embodimentjoining two or more client devices as a sub-group with pre approved sharing privileges, allows each member of the sub-group to enjoy greater coverage of their surveillance system, since all members work together,“keeping an eye out” for each other. According to one aspect of one embodiment, each client device 12 may know, or otherwise query, the location and the orientation of the field of view of every other client device located in the network, or sub-group. Since some or all client devices in a given network or sub-group may be mobile, there is an effort to always provide as much coverage within the neighborhood, or monitored area as possible, especially high-value regions within the area, such as the front doors of houses (about 80% home break-ins occur through the front door).

According to one embodiment, sub-groups of client device members may be provided with pre approved sharing privileges so as to increase the visual surveillance coverage of a particular area, such as within a neighborhood around a person’s home and vehicle, attempting to provide coverage as thorough as possible. According to this embodiment, system 10 determines the field of view 20 of each video camera 16 within a particular sub-group and then creates a virtual map of the area, showing which regions are covered by cameras and which are not. The system then uses this information to suggest parking locations to arriving members of the sub-group so that their field of view can be used to help“fill-in” any uncovered regions.

For example, according to this embodiment, if a neighbor’s house is still not being“watched” by any camera or client device by 8PM and a member of the sub-group arrives in the area, his or her client device 12 will understand from history of past events that the driver lives nearby and is on schedule to park, since it is Monday at 8PM, and these details coincide with parking history details. The system will then alert the driver to park on the right side of the main street within 100 feet. In this manner, the“blind-spot” to the neighbor’s house will be covered, by the newly- parked sub-group member. In one exemplary implementation, the system may provide a colored indication (such as, for example, a green colored bulls-eye) on touch-screen display 29 of client device 12 who is just arriving in the neighborhood. The bullseye would be centered on the perfect orientation for camera 16 of that particular client device to ensure complete coverage in the area defined by the sub-group.

According to one embodiment, a method for instructing the driver of a vehicle supporting a first video camera (client device) having a first field of view, where to park within an area, comprises first providing a plurality of video cameras (client devices) for continuously recording data within the area. Each of the plurality of video cameras are in communication with each other as part of a network. Each video camera includes a lens having a field of view, a memory for storing data, a processor, and a system for transmitting and receiving data. A next step includes having the first video camera use GPS or Bluetooth technology to determine the relative geolocation of each of the plurality of video cameras in the area. After that, the locations of any hidden regions or blind-spots (areas that are not covered by the field of view of any cameras in the area) are determined by the system. Finally, the system (which could be server 13, or any client device in the network instructs (or suggests) where the driver of the vehicle entering area should park so that the field of view of his or her own client device 12 will help eliminate a blind-spot in surveillance coverage of the area.

Alternatively, according to a variation of the above-described embodiment, a driver entering a neighborhood may be provided with a visual“coverage map” on display 29 of his or her client device 12 showing the areas of coverage of the immediate area around his or her vehicle, as he or she drives, looking for an available parking space. Here, the driver searches for parking spaces in the area based on the number of surrounding client devices covering the particular open space, as shown on the coverage map. For example, if the coverage map shows four cameras covering one open space (i.e., the field of view of each of the four cameras would include the subject parking space) and only one camera covering another parking space, the driver will select the more-covered open parking space, since he or she would want more cameras effectively watching his or her parked vehicle.

According to another embodiment, a first client device 12 is used to detect an event recorded within its field of view 20 and alert other client devices 12 located within a prescribed area around the first client device 12. Object recognition software can be used by the first client device to help detect certain events, such as when a meter-maid or a street-sweeper is approaching on the street. In this example, the first client device 12 will view and record and recognize the object of interest (such as a street-sweeper) approaching and use additional information, such as a history of when the street-sweeper usually operates on the particular street. If it is determined that the street sweeper is scheduled to clean the that street, the first client device can then transmit an urgent notification to other client devices in the area so that the owners of the affected vehicles can move their vehicle before it is too late. Other client devices 12 located near each other can work together to confirm details about an event, such as in the above example of the street-sweeper, multiple client devices 12 can be used to determine the direction and speed of the sweeper as it moves down the street. The notification sent to the owners of the other client devices 12 may include an approximate time when the street-sweeper will arrive at each respective vehicle. This time of arrival estimate may be calculated using GPS. Similar notifications can be transmitted in the event of a break-in or crash.

According to another embodiment, one client device 12 may summon other nearby client devices 12 to an area where an event has taken place, such as the scene of an accident or a traffic stop. By doing this, the summoned client devices will become witnesses to the event (or shortly thereafter), by recording the scene of the event from different angles using camera 16 of their respective client device 12. According to one embodiment, as an incentive for drivers to redirect to a nearby scene to aid a client device member, compensation may be offered in the form of money or points, which may be applied to pay for similar services, perhaps when needed in the future. When drivers accept the request, the video feed of their recording client devices 12 automatically share with the requesting client device, when the two devices become close to each other.

According to another aspect of one embodiment of the invention, at least two client devices 12 located near each other may share live video footage. For example, if at least two client devices 12 are in two different vehicles travelling relatively close to each other along a road, perhaps in traffic, the driver of a first vehicle may use his or her first client device to show all other client devices located nearby (within RF range). The nearby vehicles will appear as“car” graphic icons overlaying a map on touch-screen display 29. The first driver may select one of the icons by touching it on touch-screen display 29. The selected client device 12 would then“link” with the first client device 12 and share live video feed with that device so that the front view of the selected client device 12 appears on display 29 of the first client device. In this manner, the first driver may view other areas around his or her vehicle, such as the view of traffic up ahead, or view his or her own vehicle from behind by selecting a car behind his or her (perhaps to make sure that their boat trailer is OK). A system according to this embodiment would be useful in convoys wherein a group of vehicles agree to travel together along a highway. Rear-positioned vehicles following in the group would not be able to see up ahead owing to vehicular

obstructions. To overcome this, they could simple request a live view of the camera of the client device 12 of the forward most vehicle so that the video footage of the forward-most vehicle would play on the display of the client device of one or more other vehicles in the convoy. In addition to real-time video being provided, in one embodiment, the video stored in any of the client devices used in the convoy could be later reviewed. This will improve the chances that other client devices may have captured field of views that may have been obstructed by one particular client video.

According to another embodiment, all members of a network or sub-group can help each other by sharing video from their respect client devices 12, wherever they may be. In this

embodiment, the network may be considered“dynamic” because for any one client device 12, the detected client devices located within a prescribed distance therefrom become the network, however temporary. Some client devices 12 will move out of range, while others will enter, keeping the network of client devices surrounding any given client device 12 dynamic. By doing this, useful applications may be realized.

One application according to the above embodiment, is to provide extended automatic surveillance of a vehicle whose owner uses a client device 12 and parks in a parking lot.

Conventional car-cams can only record video footage of whatever happens within the camera’s field of view. However, the field of view of these conventional car-cams usually covers only a portion of a scene located in front of the parked vehicle. A person could hit a vehicle from the side, and in some cases the rear, without being detected or recorded, since this action would take place outside the field of view of the camera.

Referring now to Figure 5, an exemplary parking lot 80 with two parallel rows of dash-cam enabled cars 82 is shown according to one embodiment. All nearby client devices 12 are programmed to“connect” with each other, for example using an ad-hoc WiFi network. Client devices 12 continuously record their respective field of views 20 and are prepared to share video data with any other client device 12 member of the network. With many client devices 12 located in the parking lot, invariably the many field of views would cover many different views of the parking lot, including surveillance coverage of all vehicles 82. Each vehicle 82 essentially watches over other vehicles so that many vehicles will be surveilled.

If the owner of a vehicle returns to their vehicle only to see a dent in the fender, the owner may use his or her client device 12 (or supporting application on their portable electronic device) to request a video-share from any client device 12 that is either in the area, or was known to be in the area at a specific time. This includes mobile client devices 12 located in other parked or moving vehicles nearby, and also fixed client devices, such as fixed device 86 shown mounted to a nearby building (or other structure) 84, as shown in Fig. 5. Other client devices 12 may have pre-approved all such sharing requests in advance outright, or with restrictions (as further detailed in parent application PCT/US17/50991). The sharing status of each nearby client device

(both mobile and fixed devices) may appear on display 29 the car-owner’s client device 12 so that the car-owner may select specific nearby devices which are pre-approved, for example, to speed up the sharing process.

According to this embodiment, when a vehicle 82a having client device 12 enters parking lot 80, all fixed surveillance cameras 86 located throughout the parking lot automatically share data with client device 12. The owner of the entering vehicle 82a will therefore effectively and automatically extend the field of view of his or her own client device 12 by the inclusion of the collective field of views of all fixed cameras 86. Also, any client devices 12 located in other parked vehicles 82 may also share their video data, thereby further extending the effective coverage for each client device located within parking lot 80. Owners of client devices 12 located within parking lot 82 may interact with other client devices located nearby, including sharing video footage, searching for data from any video footage of any client device 12 or fixed camera 84, and tag objects within any of the collective video data. Once a client device 12 leaves the area, it automatically disconnects from the client devices and fixed cameras located in parking lot 80.

According to another embodiment, a group of networked autonomous or self-driving vehicles may each include a client device 12. System 10 uses positional data (GPS location of each client device connected to server 13), to determine the location and field of view 20 of each camera 16 of each device 12 within a given area, such as within a parking lot. According to the invention, system 10 may automatically instruct each autonomous vehicle to position themselves (i.e., park) so that each field of view 20 from each client device 12 may be strategically aligned for maximum surveillance coverage of a particular object (such as a bank), or objects, such as the many vehicles in the group. This allows one camera 16 to surveil the vehicle of another, while other cameras of other vehicles watch others, etc.

Referring again to Fig. 5, and according to another embodiment, parking lot 80 having many parking spaces 81 may already be provided with fixed cameras or client devices 86, mounted to various walls and poles and other permanent structures, such as exemplary building 84. Such fixed cameras 86 are or function similar to fixed client devices 15. When the owner of a vehicle, who is also a networked client device 12 user drives his or her vehicle 82a into lot 80, he or she automatically becomes connected to all the fixed cameras 86 located in the lot, as well as any other client devices 12, located in the parking lot at the time, as described above. With this arrangement, a client device owner may shop in nearby stores, for example and use a supporting application on their portable electronic device (such as a smartphone) to get a live view through any of the fixed cameras provided by the parking lot management, so the vehicle owner may check up on his or her vehicle at any time. Mobile client devices 12 located in other vehicles 82 in the parking lot 80 may also be accessed, with permission from the respective owners. The video data from fixed cameras 86 is stored in servers and made available to any client device owner who later requests a“share video”, within a prescribed period of time.

According to yet another embodiment, a unique code 88, such as a QR code (or other similar code, e.g., a Bluetooth beacon, RFID, or the like) may be provided at each parking space 81 located in parking lot 80. Codes 88 could be provided next to each applicable parking space, for example, for manually scanning by a driver outside their car, or on a nearby sign positioned to be automatically scanned by camera 16 of client device 12 as the vehicle pulls into the parking space 81. Alternatively, a simple numeric code, such as those typically painted on the floor could be scanned and recognized by client device 12 as the car pulls into the parking space. Codes 88 allow any driver, regardless if they are a member of the client device network or not, to access security cameras 86, which are provided by the parking lot management, but preferably only those security cameras 86 which oversee their vehicle 82. Such non-members may also be able to know if other networked client devices 12 were nearby at a similar date and time and provide means to request a video-share, for example, in one embodiment, on a reward basis for incentive to cooperate with the request.

According to another embodiment, in the event that two vehicles whose owners use networked client devices 12 hit each other in an accident, a software program operating in each client device 12 will instruct the immediately transfer of all data from their respective video memories 24, at least to each other and, according to another embodiment, also to each driver’s respective insurance company. The data being sent is preferably encrypted (with an encryption key being sent by secured means to the owner of the client device) and includes recent video data, metadata, and classifier data (during a prescribed period, before, during and possibly shortly after the accident). The sent data may also include driver profile data, such as name, picture, driver’s license information, residence address, and insurance-related information. When either owner of the other vehicle involved in the accident receives information from each other, the recipient cannot open the information until the encryption key is provided. This arrangement allows all important information to be safely retained, yet remains under the control of the sender, since he or she is in control of the encryption key.

Alternatively, according to another embodiment, some or all of the above-described information to be sent, may instead be encrypted and transferred to a secure memory location, either locally, or at server 13, and also sent to the owner’s email address, for added security. The owner of the client device will be provided an encryption key for decryption, when needed. This information will be compiled as an encrypted package that can easily be sent, when desired, to a third party, such as an insurance company. As before, the encrypted file will require an encryption key before access is provided. Many of the above-described embodiments benefit members of the networked system.

However, according to yet another embodiment, there are some benefits to individuals and businesses that are not members of the video management network. Some of these are benefits may be enabled through a companion application accessible on a computer or readily-accessible kiosks.

For example, according to one embodiment, a user identifies an area, a location, or a point of interest, such as a house, using a map displayed on the screen of a computer or portable electronic device, and would like to see this area, location, or point of interest in real time. For example, a web-based application called“Street View” provided by Google, Inc. (of Mountain View, California) currently provides views taken at street level of many street-fronts and public locations, but these views are rarely up to date, often being months or possibly years old.

According to this embodiment, a user can indicate the location of interest to a running application, which in turn, will transmit a search request, via server 13 to all client devices 12 that are either in the area, or may be in the area within a prescribed time period, as determined by server 13, client device ID information, and GPS location information. Client devices 12 that are at or close to the location indicated by the search request record video footage and then, if they accept the request, transmit the footage to server 13 in near-real time. Server 13, through the application may, for example, notify the requesting user that video clips are available for viewing by clicking on any of the stored video clip icons shown on the user’s display. Other means of presenting the requested data may be provided. For example, the application may simply display the available video, for example, as a slide-show of still images from the available video clips, as a looping video clip, or the like. If system 10 determines that no users are currently capturing data, a targeted request can be sent to nearby client devices 12 to divert their destination to capture the requested view. According to one embodiment, the system may provide compensation (offering a“bounty” with cash, rewards, or points), as described in other embodiments.

Referring back to Fig. 5, and also Fig. 6, and according to yet another embodiment, paid parking lot or garage 80 is provided with fixed security cameras 86 which effectively surveil every parking space 81 (or all“vital” points of view, including entrances and exits, and as many parking spaces 81 as possible). When a driver enters garage or lot 80 and receives a ticket 100, as shown in Fig. 6, ticket 100, according to this embodiment, will indicate his or her assigned parking space 81 (for example, G112 as shown, by way of example, in Fig. 6). QR code 88 may also be provided on the ticket and, if also provided, would match the QR code at the actual parking space (in other words, each parking space includes its own dedicated QR code 88). Other codes may be used as described above. According to this embodiment, drivers who use client devices 12 and those that don’t can use this system.

After the user parks his or her vehicle 82 in the assigned space 81, he or she may, at any time thereafter, scan the provided QR code 88, located on ticket 100. QR code 88 will automatically open a program (which must first be downloaded to the user’s portable electronic device), which will allow access to live camera footage of the user’s assigned parking space 81, as viewed by one or more fixed cameras 86 positioned throughout garage or lot 80.

In such instance, as described above, that QR code 88 is provided at each parking space 81, the owner of the car will have access to at least one security camera, if available, whose field of view includes all or a portion of the driver’s vehicle.

In all related embodiments described in this application, the video footage may be stored at a server and may be made available for downloading by verified customers of parking garage (either complementary or for a fee) or lot 80 for a period of time (such as, for example, for 2-3 weeks). The available footage may be preferably restricted to footage that only showed the user’s vehicle and only for the time that the user’s vehicle was parked in the assigned parking space 81. The owner may use this service should something happen to his or her vehicle while parked in garage 80.

According to another embodiment, the above parking surveillance system may also be used with valet parking services. According to this embodiment, a driver relinquishes his or her vehicle to a valet attendant, who then gives the driver a valet receipt and proceeds to drive the vehicle to a parking lot or garage. The receipt will include a QR code which functions as above, but now the valet attendant will first park the vehicle in any available parking space in and then input into their database the space ID that currently holds the parked vehicle. As before, surveillance cameras positioned throughout the parking facility will capture and record all parking spaces. At any time after the vehicle is parked and the parking space ID is associated with the code provided to the vehicle owner, the owner of the vehicle may use the QR code provided on his or her valet ticket to automatically open the valet’s website, or similar application and access live video feed (or other information) for his or her vehicle. If the QR code does not have an associated parking space when the user trys to access the system, for example, if the valet attendant has not yet assigned a parking space 81 to the vehicle, then the user can be given a "processing" message, a view of the entire parking area and/or an option to directly contact valet to ask why access is not yet available.

QR code 88 will cause the application to interrogate the server’s database to link QR code 88 with one or more of surveillance cameras 86, the ones that show the user’s vehicle 82. The user may then view live video footage showing his or her vehicle in the assigned parking space 81. As before, the footage is available for a length of time thereafter, such as, for example, 2-3 weeks.

In an alternative embodiment of the valet parking system, a“loaner” client device 12 can be temporarily positioned in a vehicle by a valet attendant to provide surveillance while the vehicle remains parked in garage or lot 80. Temporary Client device 12 remains in vehicle 82 and the owner, as in the above embodiments, continues to have with full access to inside/out views as well as fixed cameras in the lot itself

According to another embodiment, client devices 12 of a network may be used to track any characteristic of a vehicle or an object moving through the network and using AI to predict future path of the tracked vehicle. For example, during an“Amber Alert,” information about a suspect’s vehicle is broadcasted on everyone’s smartphones, and drivers are alerted to watch out for any vehicle that matches the description and then alert authorities of any sightings. The present invention may use object-recognition software to scan all objects and other details appearing in field of view 20 of cameras 16 of all client devices 12 located within a network.

For example, if the vehicle description for the Amber Alert is a Red Late-Model pickup truck, the object-recognition software can be used to scan current recorded video from each client device located in an area of interest (an area that it is believed the suspect is likely residing at a given time), and also already recorded video from each video memory 24 of each client device 12 in the prescribed area. The software will notify server 13 every time a red pickup truck enters the field of view 20 of any client device 12 in the network. Server 13 can then automatically report potential sightings to Amber Alert authorities, as needed. Also, notifications from the Amber Alert system may be able to automatically connect to server 13 so that the description information may automatically generate an appropriate search request to server 13, which will then determine which client devices 12 of the network should be notified, based on their respective current, past, and future location. Any sighting by any client device 12 may establish the heading and speed of the suspect being tracked. This information may be used to notify other specific client devices 12 to watch for the suspect’s vehicle, based on the predicted path of the suspect.

According to another embodiment of the invention, client device 12 uses global positioning system (GPS) data and information from server 13 to automatically help redirect drivers either towards or away from an object of interest, depending on what the driver wants to do. For example, if an accident is reported ahead of a vehicle driven by a client device user, and this is confirmed by either the client device 12 of the actual vehicle that was involved in the accident, or other client devices 12 that detected the accident as their vehicle passed by. Regardless, system 10 will determine which vehicles, with client devices 12 are approaching the accident, as traffic slows down. To help network clients, system 10 automatically instructs select member vehicles (that are or will be affected) to redirect their route to avoid the accident and traffic.

New directions will be sent to and displayed (and/or audibly announced) on each affected client device 12, e.g.,“Turn Left in 500 feet to avoid upcoming accident.” Alternatively, the system may help direct a vehicle to a point of interest, following a search request or a witness request as described in several embodiments of this disclosure.

According to yet another embodiment, client devices 12 may be used to automatically detect emerging inclement weather, such as snowfall, road hazards, and potholes and notify specific client devices 12 whose respective vehicles are approaching the area of concern. This information is automatically compiled by server 13 and shared with GPS location information to various relevant agencies, as needed, so the potholes can be repaired, for example. Additionally, each client device may use image recognition software and collected sensor data to look for small changes in road conditions. Over time the data will be confirmed by many client devices 12 revealing verified and accurate data which may be useful to other drivers or even other third parties (e.g., certain government agencies or other business concerns). The system of the present invention can use this information in combination with other collected information, such as detected movement of vehicles (either the vehicle that uses a client device 12, or vehicles being recorded by a client device) wherein the detected movement suggests a road hazard, such as an accident, vehicle swerving, or sliding, or even a traffic stop. This collected event information when correlated with collected road condition information forms a dataset that is likely useful to insurance companies, law enforcement agencies, road maintenance agencies, and agencies collecting highway statistics, to state a few examples.

According to yet another embodiment, client devices 12 of the network can be used as a general communication device, as introduced above, wherein a driver may request to be connected with another driver based on certain requirements. Client device 12 can detect if a driver is nodding off by tracking eye movement of the driver. If so, client device 12 may sound an alarm and may then suggest that the driver pull over for rest. If the driver continues to drive, client device 12 will recommend that the driver connect with another driver in the network so that the two drivers may keep each other awake and entertained as they drive.

According to another embodiment, a driver in need of information about an upcoming point of interest, or city, can request to speak with another person in the network who is knowledgeable in the desired area of interest, such as“I’m visiting San Francisco soon. Does anyone know the best places to eat?” The request can be sent to an approved list of client device users, or to anyone. The requesting driver is given a list of people who can help and he or she may select one of them to initiate a video-chat. The two can communicate with each other as they both drive. Both people will be given a live view of camera 16 of the other person’s client device 12 (either an inside view or a forward view).

Fig. 7 is a view of an exemplary area under surveillance by a network of client devices according to one embodiment. For example, in one embodiment the surveilled area is a parking lot, having several parked vehicles, some of which include networked client devices 12. The client devices 12 can include one or more signaling devices, such as, for example, light emitting diode (LED) devices. In one embodiment, each client device 12 includes a beacon LED 17 and an illumination LED 19. The client devices 12 can connect to cloud-based server (Fig. 1, 13). The management system 10, using the cloud-based server 13 provides services to client devices 12 via wireless communications. In one embodiment, cloud-based server services include a timing service and a messaging service. In one embodiment, cloud-based server 13 includes a plurality of servers, each providing a dedicated service. For example, cloud-based server may include a time server, a message server, and the like. As one of ordinary skill in the art will recognize, these servers may be hardware servers (e.g., rack blades),“virtual” servers implemented is software, as a virtual machines, as software modules in existing hardware, or otherwise as software modules programmed to receive and respond to client requests, or any combination of these.

According to one embodiment, the client devices 12 can request the current time from the time server and synchronize their respective internal clocks in accordance with the time reported by the time server. The request for the current time from a client device 12 can include a request code indicating that the time is requested from the time server, and, optionally, a unique identifier associated with the specific client device and the GPS location of the client device. According to one embodiment, the time server periodically provides a timing signal to all the client devices 12 connected to the network to keep all the client devices synchronized to a single universal clock.

Once a client device 12 is synchronized with the time server, upon being placed into a“monitor mode” by a user, the client device 12 will pulse its beacon LED 17 in accordance with its synchronized internal clock. In the“monitor mode” the client device can be responsive to a “security event” such as a vehicle intrusion as will be more particularly described below. When in“monitor mode” the client device 12 pulses its beacon LED 17 to provide a visual indication that it is actively monitoring for security events. In the example of Fig. 7 where there are many client devices 12, each client device can pulse its respective beacon when in monitor mode.

Given the synchronization imposed by the cloud-based server 13, the respective internal clocks of all networked client devices are synchronized with the universal clock of the time server. Accordingly, in this embodiment, the beacon LEDs in all the client devices 12 will pulse at the same phase and frequency, shining their lights at substantially the same time.

From the point of view of a person having criminal intent, illustrated in Fig. 7 as person 200, the unified pulsing beacons 17 can convey an unmistakable message that the area is under active surveillance by multiple cameras working together, as indicated by their synchronous flashing, and providing coverage of different angles of the surveilled area. To the perpetrator 200, this would indicate that breaking into any of the parked cars would be subject to monitoring and reporting by multiple devices, making the surveilled area a less appealing area to commit a crime, and perhaps deterring criminal activity.

According to one embodiment, the beacon LEDs 17 can flash their lights pulsing in unison according to a pattern. For example, the beacon LEDs 17 can repeatedly turn on for 500 ms, then turn off for 1500 ms. In another example, the beacon LEDs 17 can repeatedly pulse a double-pulse by turning on for 500 ms, off for 500 ms, on for 500 ms, then finally off for 1500 ms. In yet another example, the beacon LEDs 17 can repeatedly pulse on for 1500 ms and off for 500 ms. Those of skill in the art will appreciate that various patterns of pulsing an LED are contemplated and within the scope of this invention. It is also noted that, while preferred embodiments of the invention utilize an LED to emit light, other light sources are contemplated and within the scope of the invention. It is further noted that although the specification and claims refer to an“LED” that the term is intended to include equivalents thereof including other electric light sources.

The beacon LED 17 can be one single-color LED, a multi-color LED, or many LEDs of different colors. A single-colored LED can be, for example, white, red, green, or blue. A multi-colored LED can be a single LED package having multiple embedded LEDs of different colors such as a single LED package having a white, red, green, and blue LED therein. The beacon LED 17 can be many LEDs in the same client device such as a group of three LEDs in red, yellow, and green.

In one embodiment, the beacon LED 17 is capable of providing multiple color illumination, for example, with a multi-color LED or multiple LEDs of differing colors. In this embodiment, the color of the beacon can also indicate the alert status of the client device. For example, a flashing green beacon LED 17 can indicate that the client device is active and monitoring. A flashing yellow beacon LED 17 can indicate that a warning condition has been detected such as unexpected movement or vibration. A flashing red beacon LED 17 can indicate that a security event has been detected such as a vehicle intrusion or glass breakage. Each LED color can have a different pulse profile as described above. For example, a green LED can pulse slowly, a yellow LED somewhat faster, and a red LED can pulse still faster. In this way, the frequency of the pulsing beacon LED 17 can also indicate the urgency or importance of the monitoring status. In embodiments of the invention, the color of the pulsing beacon LED 17 can indicate membership to a surveillance group. It is contemplated that a single user may have many client devices and that the client devices for a single user can be part of a surveillance group. The single-user’s client devices may be for example, in a primary vehicle, a secondary vehicle, and other client devices fixed in a garage or dwelling unit. All of the client devices in a surveillance group can have pulsing beacon LEDs that flash the same color. The color can be user selectable in accordance with preference.

When a client device is in“monitor mode,” in addition to pulsing the beacon LED 17, the client device can be responsive to security events. For example, in embodiments where the client device 12 includes a camera facing an interior of the vehicle, a“security event” can be indicated by movement detected on the interior of the vehicle by an interior facing camera. A security event can also be indicated by another system such as a vehicle alarm system, or an indication of a security event from another client device or the message server.

In one embodiment, upon detecting a“security event” a client device 12 can transition to a “triggered mode” wherein the client device activates an illumination LED 19 and a video camera. The illumination LED 19 can be associated with a video camera (Fig. 1, 18) of the client device such that the illumination LED 19 illuminates the field of view (Fig. 1, 20) of the camera. The illumination LED 19 can be a separate LED package from the beacon LED 17. Alternatively, the illumination LED 19 can be an LED in the same package of a multi-color beacon LED 17. Although the illumination LED 19 is depicted in Fig 7 as exterior-facing, it is contemplated and within the scope of the invention that the illumination LED 19 is alternatively facing an interior of a vehicle. It is further contemplated that there are multiple illumination LEDs 19 in a single client device that cast light in many directions. According to various embodiments, activation of the illumination LED 19 can serve several purposes. For example, the light emitted by the illumination LED 19 can improve lighting conditions for the camera to record video. As another example, the illumination LED 19 can indicate to a person having criminal intent 200 that they have been seen and are being recorded thereby deterring further criminal behavior. In different embodiments, the illumination LED 19 may also serve other purposes in addition to or as alternative to these.

A“security event” can further cause a client device 12 to send a“security event message” to the messaging component or messaging server of cloud-based server (Fig. 1, 13). In one

embodiment, the“security event message” can indicate that a particular client device 12 has detected a security event. The“security event message” can optionally include the GPS location of the client device that detected the security event if the location of the client device is not already known to the messaging server. The messaging server can then send“security event messages” to other nearby client devices to cause them to transition to a“triggered mode” in which they also activate their illumination LEDs and begin recording. Another client device can be considered“nearby” if it is within 50, 200, or 500 meters of a security event. In this way, a greater number of cameras can record potentially criminal activity and the person having criminal intent 200 may be further deterred by the visual response of the illumination LEDs of many client devices.

According to one embodiment, the securing event detection and reporting may be implemented as described in co-pending application No. PCT/US19/34437, titled“High-Priority Event Generation and Reporting for Camera-Based Security System,” filed on May 29, 2019, which is incorporated herein in its entirety.

Fig. 8 is a system diagram according to another exemplary embodiment of the invention. As shown in Fig. 8, the system includes a plurality of client devices 810, 820, and 830 and a cloud- based server 13 having a time server 840 and a messaging server 850. The client devices 810, 820, and 830 can request and receive the current time from time server 840. The client devices 810, 820, and 830 can report and receive“security event messages” from the messaging server 850, for example as described in the above-referenced application (PCT/US19/34437).

A request from a client device to the time server 840 can include, among other parameters, a message code indicating that the current time is requested and, optionally, a unique identifier of the requesting client device and the GPS location of the client device. A response from the time server can include, among other parameters, the current time from the universal clock of the management system 10.

A“security event message” from a client device (e.g. 810) to the message server 850 may include, among other parameters, a message code indicating that message is a“security event message” and, optionally, the GPS location of the client device. In response, the message server 850 can send a“security event message” to client devices 820 and 830. In embodiments of the invention, the message server only sends“security event messages” to client devices 820 and 830 when client devices are within a predetermined proximity of the client device that originated the“security event message.” The predetermined proximity can be large enough to capture potential activity of interest but small enough to avoid unnecessarily burdening distant client devices. In embodiments of the invention, the predetermined proximity is 50, 200 or 500 meters.

Time server 840 and message server 850 are shown and described as separate servers. Those of skill in the art, however, will appreciate that servers 840 and 850 could be implemented as virtual servers on the same hardware, as completely separate servers on separate hardware, as separate software modules of the same server, or as logical components of a single software system running on a single server. Applicants’ use of the term“server” is intended to cover the aforementioned configurations.

Fig. 9 is a process flow chart according to an exemplary embodiment of the invention. As shown in Fig. 9, a client device can synchronize its beacon LED 17 with a time server and activate its illumination LED 19 upon detecting a security event.

In step 900 a client device can request the current time from a time server. The request for the current time can include a request code indicating that the current time is being requested. The request can further include the GPS coordinates of the client device and a unique identifier of the requesting client device such as a serial number. The coordinates of the client device can be used in embodiments of the invention to determine if it is in close proximity to other client devices. In response to a request for the current time, the time server can respond with the current time. The current time can be encoded according to methods known in the art.

Alternatively, in one embodiment, client device 12 periodically reports its location, along with other metadata, in telemetry reports to the cloud-based server 13. In this embodiment, at step 900, time server sends a synchronization time message to client device 12 reporting the universal clock time.

In step 910, the internal clock is synchronized in accordance with the time received from the time server. Because this method is performed by all the client devices in the management system 10, the internal clocks of all client devices in the system are synchronized.

In step 920 the client device is set to“monitor mode.” This step can be performed manually by a user much in the same way that a traditional security system is activated. For example, when the client device is installed in a vehicle, a user may set the client device to“monitor mode” upon leaving the vehicle. For example, client device may detect the vehicle turning off via a CAN bus connection and after a predetermined time period enter“monitor mode.” In another

embodiment, client device detects the presence of the Bluetooth ID of the user’s mobile device. When the mobile device is not detected for a predetermined period of time, the client device enters“monitor mode.” In yet another embodiment, client device receives presence reports from cloud-based server 13, which can also indicate when the user is no longer present, triggering the “monitor mode.”

When set to“monitor mode” the client device can pulse its beacon LED in accordance with the synchronized time on its internal clock. For example, the beacon LED can be normally off, and flash on for 250 ms every 2000 ms. In another example, the beacon LED can be normally off, but flash on for 1000 ms every 2000 ms. The flashing intervals can be set to correspond to the internal clock, for example, each flashing of the beacon LED can begin on every second of the current time exactly. In this way, the client device provides visual feedback that it is in“monitor mode.” Because there may be multiple client devices in the system and the internal clock of each is synchronized with the time server, client devices in“monitor mode” will pulse their respective beacon LEDs in unison. The unified pulsing of beacon LEDs can be an intimidating signal to a person having criminal intent and potentially deter criminal activity.

In step 930 a security event can be detected by the client device. The security event can be triggered by a signal from a sensor such as, for example, a motion sensor, a vibration sensor, a sound sensor, a glass-break sensor, or an electrical or magnetic switch. Additional security event detection techniques are described in in the above-referenced application

(PCT/US19/34437), which may be used according to embodiments of this disclosure. Upon detecting a security event the client device can activate its illumination LED. The illumination LED can be associated with camera of the client device such that the illumination LED provides additional lighting for the camera to potentially record criminal activity.

Also in step 930, upon detecting the security event, the client device can also send a“security event message” to a message server indicating that the client device has detected a security event. The“security event message” can include a message code indicating that it is a“security event message.” The“security event message” can also include the GPS location of the client device and optionally a unique identifier of the client device. Additional security event messaging techniques are described in in the above-referenced application (PCT/US19/34437), which may be used according to embodiments of this disclosure.

In step 940, the message server can send a“security event message” other client devices that are in close proximity to the client device that originated the“security event message.” A client device can be considered to be in close proximity when it is within 50, 100, 200 or 500 meters of the client device originating the“security event message.” The“security event message” sent by the message server can include a message code that a security event has been detected. The message server can know which other client devices are in close proximity from a location parameter of time request messages that are sent by client devices when the client devices synchronize their internal clocks with the time server. In alternative embodiments, client devices are configured to periodically send their location to the message server.

In step 950, nearby client devices can activate their respective illumination LEDs and optionally use their internal cameras to begin recording. The illumination LEDs can be much brighter than the beacon LEDs. Activation of the illumination LED can create an unmistakable visual signal that a security event has been detected and potentially deter criminal activity. The foregoing description of the embodiments has been presented for illustration only; it is not intended to be exhaustive or to limit the patent rights to the precise forms disclosed. Persons skilled in the relevant art can appreciate that many modifications and variations are possible in light of the above disclosure. The language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the patent rights be limited not by this detailed description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of the embodiments is intended to be illustrative, but not limiting, of the scope of the patent rights, which is set forth in the following.