-
公开(公告)号:US10509459B2
公开(公告)日:2019-12-17
申请号:US15469380
申请日:2017-03-24
Applicant: Scenera, Inc.
Inventor: David D. Lee , Andrew Augustine Wajs , Seungoh Ryu , Chien Lim
Abstract: An approach to sensor data is based on scenes. One aspect concerns a computer-implemented method for specifying and obtaining a variety of sensor data and processed sensor data related to a scene. The method incorporates a Scene-based API that uses SceneModes and SceneData. An application requesting sensor data communicates a SceneMode to a group of one or more sensor devices and/or sensor modules via the Scene-based API. The SceneMode determines the SceneData to be captured or provided by the sensor group, which typically includes different types of sensor data related to the Scene and also further processed or analyzed data. The application receives the SceneData from the sensor group via the Scene-based API, with the SceneData organized into SceneShots which are samples of the Scene.
-
公开(公告)号:US10412291B2
公开(公告)日:2019-09-10
申请号:US15583919
申请日:2017-05-01
Applicant: Scenera, Inc.
Inventor: David D. Lee , Andrew Augustine Wajs , Seungoh Ryu , Chien Lim
IPC: H04N5/232 , H04N5/225 , H04N5/235 , H04N5/33 , H04N5/247 , H04N5/77 , H04N13/254 , H04N13/271 , H04N13/239
Abstract: A sensor device has a sensor base with a sensor mount, for which different sensor assemblies are attachable to the sensor mount. The sensor base transmits different settings to the sensor assembly via the sensor mount interface. The transmission preferably is wireless, rather than using mechanical connectors. The sensor assembly stores the settings in control registers that determine the settings for the capture of sensor data. In one approach, the sensor base includes an application processor and software executing on the application processor determines the settings. The control registers for the sensor assembly are thus software programmable, allowing different settings to be applied to different samples of sensor data.
-
公开(公告)号:US20190258864A1
公开(公告)日:2019-08-22
申请号:US15900489
申请日:2018-02-20
Applicant: Scenera, Inc.
Inventor: David D. Lee , Andrew Augustine Wajs , Seungoh Ryu , Chien Lim
Abstract: Automated discovery of the relative positioning of a network of cameras that view a physical environment. The automated discovery is based on comparing TimeLines for the cameras. The TimeLines are time-stamped data relating to the camera's view, for example a sequence of time stamps and corresponding images captured by a camera at those time stamps. In one approach, the relative positioning is represented by a proximity graph of nodes connected by edges. The nodes represent spaces in the physical environment, and each edge between two nodes represents a pathway between the spaces represented by the two nodes.
-
公开(公告)号:US20180069838A1
公开(公告)日:2018-03-08
申请号:US15642311
申请日:2017-07-05
Applicant: Scenera, Inc.
Inventor: David D. Lee , Andrew Augustine Wajs , Seungoh Ryu , Chien Lim
CPC classification number: H04L63/0428 , G06F21/10 , G06F21/57 , G06F21/6245 , G06F2221/0724 , G06F2221/2107 , G06F2221/2113 , G06K9/00718 , G06K9/00771 , G11B27/28 , G11B27/34 , H04L9/3236 , H04L2209/38 , H04N7/181
Abstract: Security and access control is provided for sensor devices, the data captured by sensor devices, and the results of processing and analyzing that data. In one aspect, SceneData related to a Scene is requested from a sensor-side technology stack and at least some of the SceneData is secured, for example by encryption. Different SceneData can be secured separately and at different levels of security, thus providing fine-grained security of the SceneData. In yet another aspect, data security is implemented by a separate privacy management system. In yet another aspect, sensor devices themselves are secured against external network threats. The sensor device includes an execution environment and a separate network management layer that secures the execution environment against threats from the external network. In one implementation, the sensor device is partitioned into a trusted region and a non-trusted region, and the network security stack is implemented in the trusted region.
-
-
-