Cypress CY62167EV18 Instrukcja Użytkownika Strona 14

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 30
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 13
US
8,121,078
B2
7
data
transmission.
For
example,
by
implementing
a
second
low-bandwidth
radio/transceiver
in
the
wireless
camera,
the
modi?ed
media
access
techniques
can
be
triggered
and
con
trolled
through
the
second
radio.
The
low-bandwidth
radio
can
establish
a
link
in
conditions
where
the
high-bandwidth
radio/transceiver
cannot.
By
incorporating
more
functionality
in
the
base
station
of
the
wireless
network
camera
system,
the
base
station
can
detect
and
correct
link
problems
by
requesting
retransmission
of
the
captured
data.
Such
request
can
be
sent
via the
low
bandwidth
radio
which
can
be
more
reliable
and
use
lower
power
than
the
high-bandwidth
radio.
This
retransmission
can
be
hidden
and
transparent
to
the
client
surveillance
appli
cation
through
the
virtual
web
server
or
relay
server
in
the
base
station.
In
addition,
image
and
video
analytical
functions
such
as
object
recognition,
people
counting,
and
license
rec
ognition
can be
implemented
in
the
base
station
rather
than
the
camera.
These
analytical
functions
can
be
implemented
in
a
hidden
way
so
that
it
logically
appears
to
the
client
that
these
functions
are
occurring
in
the
camera.
Furthermore,
in
appli
cations
where
privacy
of
the
image
or
audio
data
needs
to
be
protected,
the
data
transmitted
wirelessly
can
be
encrypted.
The
speci?c
aspects
may
be
implemented
using
a
system,
method,
or
a
computer
program,
or
any
combination
of
sys
tems,
methods,
and
computer
programs.
The
details
of
one
or
more
embodiments
are
set
forth
in
the
accompanying draw
ings
and
the
description
below.
Other
features,
aspects,
and
advantages
will
be
ascertained
from
the
description,
the
drawings,
and
the
claims.
BRIEF
DESCRIPTION
OF
THE
DRAWINGS
These
and
other
aspects
will
now
be
described
in
detail
with
reference
to
the
following drawings.
FIG.
1
is
a
block
diagram
of
a
battery
powered
wireless
camera.
FIG.
2
shows
a
battery
powered
wireless
network
camera
system
for
remote
surveillance
applications.
FIG.
3
shows
another
battery
powered
wireless
network
camera
system
for
remote
surveillance
applications.
FIG.
4
is
a
diagram
showing
a
burst
data
transmission.
FIG.
5A
shows
a
?ow
chart
of
a
MAC
algorithm
that
can
be
used
by
the
wireless
camera.
FIG.
5B
is
a
?ow
chart
showing
a
process
that
can
be
used
to
implement
the
CTS-to-Self
algorithm.
FIG.
6
shows
a
block
diagram
of
a
battery
current
limiting
circuit
that
can be
used
to
connect
to
the
camera
power
input.
FIG.
7
is
a
block
diagram
of
computing
devices
and
sys
tems.
Like
reference
symbols
in
the
various
drawings
indicate
like
elements.
DETAILED
DESCRIPTION
OF
THE
INVENTION
The
systems,
apparatus
and
techniques
described
herein
relate
to
providing
wireless
network
camera
systems.
For
example,
the
wireless
network
camera
systems
described
herein
can
operate
for
an
extended
period,
e.g.,
months
or
even
years
without
maintenance
in
certain
applications.
By
looking
at
the
energy
requirements
of
the
system
over
time,
the
systems
and
techniques
described
herein
use
a
time-sliced
energy
cycling
technology
to
distribute
processing
needed
over
time
and
location.
Furthermore,
the
systems
and
tech
niques
described
herein
are
combined
with
modern,
available
wireless
technologies
(such
as
the
modulation
schemes
deployed
in
systems
like
WiFi
802.11)
and
off-the-shelf
advanced
semiconductor
components.
As
a
result,
an
overall
20
25
30
35
40
45
50
55
60
65
8
reduction
in
the
camera
power
of
two
or
more
orders
of
magnitude
can
be
achieved.
For
example,
the
wireless
camera
described
herein
can
potentially
operate
on
less
than
10
mW
of
power
on
a sustainedbasis,
and
the
wireless
camera
can run
over
12
months
using
10
AA
Lithium
batteries.
Connection
from
the
base
station to
other
IP
security
video
cameras
and
network
can be
done
via
wired
or
wireless
links.
Each
wireless
camera
connected
to
the
base
station
can
be
assigned
an
IP
address
from
the
Ethernet
router
through
the
regular
DHCP
or
other
standard
Ethernet
methods.
Further,
each
wireless
camera
in
the
network
behaves
like
a
regular
IP
camera
to
any
existing
client
or
application
on
the
LAN.
In
this
way,
each
wireless
camera
can
be
addressable
through
industry
standard
APIs
so
that
each
video
stream
and
each
wireless
camera
can be
viewed,
recorded,
and
manipulated
individually
without
any
modi?cations
to
existing
applica
tions
and
hardware.
The
wireless
network
camera
systems
described
herein
can
be
used
in
numerous
applications,
such
as
alarm
veri?cation
and
surveillance
applications
for
constructions
sites,
mobile
transportation,
and
border
patrol.
Construction
Sites
Construction
theft
is
widespread
and
nothing
new,
but
the
amount
of
theft
is
increasing.
Construction
thefts,
which
are
rarely
solved,
can
lead
to
construction
delay,
higher
costs
and
insurance
rates,
and
higher
home
prices.
The
National
Asso
ciation
of
Home
Builders
estimates
that
the
construction
theft
problem
costs
the
US
building
industry
$4
billion
annually
and
increases the
cost
of
the
average
home
by
1.5
percent.
Some
builders
try
to
protect
themselves
by
using
bind
tools
and
materials
into
heavy
heaps
or
block
driveways.
Most
install
temporary
locks
on
windows
and
doors
and
wait
until
the
last
minute
to
install
appliances.
Installing
traditional
video
security
cameras
can be
dif?
cult
because
power
is
unlikely
to
be
available
at
the
location
best
served
by
the
video
camera.
Most
builders
are
unwilling
to
invest
the
dollars
for
a
temporary
installation.
In
addition,
cabling
for
a
network
camera
system can
be
impractical
at
the
construction
site.
The
wireless
network
camera
systems
described
herein
can
offer
a
solution
to
this
problem.
Wireless
cameras
can be
quickly
added
and
moved
during
the
con
struction
phase,
and
theft
activity
can
be
identi?ed
in
real
time.
Since
the
cameras
are
temporary,
the
builder
can
re-use
the
cameras
at
other
new
construction
site,
decreasing
the
initial
investment
for
a
total
security
system
to
cover
all
construction
projects.
Mobile
Transportation
Without
proper
measures,
public
transit
vehicles,
school
buses,
light
rail
cars,
and
trains
can be
affected
by
security
issues
involving
passengers
and
operators.
Problems
such
as
vandalism,
assault
and
even
suspicious
liability
claims
can
affect
or
disrupt
an
operation.
While
there
are
mobile
surveil
lance
systems,
they
require
an
on-board
DVR
which
can
be
cumbersome
and
dif?cult
to
retro?t
into
an
existing
transpor
tation
vehicle.
In
addition,
the
existing
system
may
not
pro
vide
real-time
information
to
a
central
monitoring
station.
The
wireless
network
camera
systems
described
herein
can
alleviate
this
problem
with
a
low
installation
cost,
and
very
little
additional
equipment
to
install.
With
protected
dome
cameras
at
multiple
locations
on
the
transportation
vehicle,
a
broad
coverage
can
be
enabled,
while
providing
an
avenue
for
central
monitoring
through
a
3G
IP
based
data
network.
The
base
station
can
store
images
temporarily
should
an
interruption
occur
through
the
3G
net
work
preventing
immediately
transfer
of
images.
With
the
temporary
storage
at
the
base
station,
a
near
real-time
video
security
monitoring
can
still
be
obtained
with
a
very
cost
Przeglądanie stron 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 29 30

Komentarze do niniejszej Instrukcji

Brak uwag