Holographic technology implemented security solution

ABSTRACT

Disclosed are techniques that use mixed reality, e.g., augmented reality and virtual reality technologies to improve analysis of security situations as well as retail processes and activity in retail stores. For security these techniques merge the physical world embodied in security systems with the virtual world of policies and analytics. In the retail aspect, these techniques merge the physical world of retail items, displays, and spaces with the virtual world of policies and analytics.

CLAIM OF PRIORITY

This application claims priority under 35 U.S.C. § 119(e) to provisionalU.S. Patent Application 62/361,053, filed on Jul. 12, 2016, entitled:“Holographic Technology Implemented Security and Retail Solutions” theentire contents of which is incorporated herein by reference andprovisional U.S. Patent Application 62/361,669, filed on Jul. 13, 2016,entitled: “Holographic Technology Implemented Security and RetailSolutions the entire contents of which is incorporated herein byreference.

BACKGROUND

This description relates to intrusion, surveillance and alarm systems ofvarious types (generally security systems) and integrated versions ofsuch security systems that combine two or more of such systems.

It is common for businesses and homeowners to have a security system fordetecting alarm conditions at their facility and signaling theconditions to a monitoring station or authorized users of the securitysystem. For example, such buildings employ systems in the areas of firedetection, smoke detection, intrusion detection, access control, videosurveillance etc.

Virtual guard tour services are known in which personnel at monitoringcenters access various video feeds from cameras deployed in a protectedfacility, e.g., a building or a facility, along with other sensor data,and observe that video data and other sensor data on one or moremonitors attached to a user stations or on one or more monitors affixedto a wall of a building. The user observes this data that is receivedfrom a protected building to conduct surveillance for potentialintruders or other security or safety issues.

Augmented reality, virtual reality and mixed reality technologies areknown. Generally, virtual reality refers to technologies that replicatean environment with a simulation of a user being immersed in thereplicated environment. Augmented reality, generally refers totechnologies that present a view of a real-world environment augmentedwith computer generated data. Mixed reality a relatively new termgenerally involves technologies that involve a merging of real world andvirtual world environments where real and virtual objects exist andinteract.

SUMMARY

According to an aspect, a system includes a server computer system thatreceives video feeds from plural, fixed video cameras in a facility, theserver computer system including a storage device that stores a programof computing instructions for execution by server computer system, theprogram comprising instructions configured to cause the server computingsystem to control a mixed reality system comprising a processor deviceand a memory in communication with the processor device, and a headmounted display device including a stereoscopic 3D display, with themixed reality system configured to send requests to the server systemfor specified video feeds, receive the video feeds, receive userinstructions to pin a specific one of the feeds to a particular positionas rendered on the display, and render using the head mounted displaydevice, the specific one of the feeds onto the particular position.

Aspects also include computer program products and computer implementedmethods.

One or more of the following advantages may be provided by one or moreof the above aspects.

Disclosed are techniques that use mixed reality and/or augmented realityand virtual reality technologies to improve the analysis of security andother situations. The disclosed techniques use computer implementedtechniques that obtain information from various electronicsystems/devices in the physical world, which devices are exemplified bysecurity systems, and merge that information into a virtual world ofpolicies and analytics that involve such security systems.

The details of one or more embodiments of the invention are set forth inthe accompanying drawings and the description below. Other features,objects, and advantages of the invention is apparent from thedescription and drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic diagram of an exemplary networked security system.

FIG. 2 is a block diagram of generally conventional constrained device.

FIGS. 3-4 are flow charts depicting application processing using mixedreality systems with security systems.

FIGS. 5A, 5B are views seen in a display of a mixed reality device.

FIG. 6 is a block diagram of a session manager.

DETAILED DESCRIPTION

As shown in FIG. 1, described herein are examples of an integratedplatform 10 that integrates via a distributed network 11, mixed realitydevices 13 a-13 c with security/intrusion/alarm/surveillance systems 15a-15 c (typically including sensors 20, functional nodes 18 andtypically including a panel not shown).

Examples of mixed reality devices 13 a-13 c are those in which the mixedreality devices incorporate a live, real world presentation of elementsof the physical real-world with virtual elements that are calculated orproduced from inputs and which are rendered on a display so that to auser these calculated or produced elements are perceived to existtogether with the physical real world in a common environment. Examplesof such mixed reality devices 13 a-13 c include mixed reality devicessuch as Hololens® (Microsoft), (a smart-glasses, cordless, Windows 10®(Microsoft) computer headset that includes various sensors and ahigh-definition stereoscopic 3D optical head-mounted display, andspatial sound to allow for augmented reality applications. Other mixedreality devices/augmented reality systems such as Google Glass® (Google)could be used. There are many such systems on the market of which theseare two examples.

The security systems 15 a-15 c typically include a panel (not shown),such as for an intrusion detection system, an intrusion detection panelwired or wirelessly connected to a variety of sensors deployed in afacility. Typically, such panels receive signals from one or more ofthese sensors to indicate a current state or value or that a particularcondition being monitored has changed or become unsecure.

The integrated platform 10 includes data collection systems that arecoupled to wireless sensor networks and wireless devices, with remoteserver-based monitoring via servers 14 and report generation. Asdescribed in more detail below, wireless sensor networks generally use acombination of wired and wireless links between computing devices, withwireless links usually used for the lowest level connections (e.g.,end-node device to hub/gateway 16). In an example network, the edge(wirelessly-connected) tier of the network is comprised ofresource-constrained devices 20 with specific functions. These devices20 may have a small-to-moderate amount of processing power and memory,and may be battery powered, thus requiring that they conserve energy byspending much of their time in sleep mode. A typical model is one wherethe edge devices 20 generally form a single wireless network in whicheach end-node communicates directly with its parent node (e.g., 18) in ahub-and-spoke-style architecture. The parent node may be, e.g., anaccess point on a gateway or a sub-coordinator which is, in turn,connected to the access point or another sub-coordinator.

In FIG. 1, the distributed network 11 is logically divided into a set oftiers or hierarchical levels 12 a-12 c. The mixed reality devices 13a-13 n are shown in communication with the top one or two tiers orhierarchical levels 12 a-12 c. In FIG. 1, the lower level tier 12 c isillustrated divided into different facility 19 a-19 c for ease inexplaining details of the applications that will be discussed below. Thefacility 19 a-19 c are each associated with one of the security systems15 a-15 c. The security systems can be independent meaning that thereare no connections (as shown) among fully functional nodes of differentfacility or dependent meaning that there are connections (not shown)among fully functional nodes of different facility.

In the upper tier or hierarchical level 12 a of the network are disposedservers and/or virtual servers 14 running a “cloud computing” paradigmthat are networked together using well-established networking technologysuch as Internet protocols or which can be private networks that usenone or part of the Internet. Applications that run on those servers 14communicate using various protocols such as for Web Internet networksXML/SOAP, RESTful web service, and other application layer technologiessuch as HTTP and ATOM. The distributed network 11 has direct linksbetween devices (nodes) as shown and discussed below. Servers 14 executeanalytics (analysis programs of various sorts) that are managed inconcert with a session manager system 80 (FIG. 4). The servers 14 canaccess a database 23.

The second logically divided tier or hierarchical level 12 b, referredto here as a middle tier, involves gateways 16 located at central,convenient places inside individual buildings and structures, e.g., 13a-13 c. These gateways 16 communicate with servers 14 in the upper tierwhether the servers are stand-alone dedicated servers and/or cloud basedservers running cloud applications using web programming techniques. Themiddle tier gateways 16 are also shown with both local area network 17 a(e.g., Ethernet or 802.11) and cellular network interfaces 17 b. Eachgateway is equipped with an access point (fully functional node or “F”node) that is physically attached to that access point and that providesa wireless connection point to other nodes in the wireless network. Thelinks (illustrated by lines not numbered) shown in FIG. 1 representdirect (single-hop MAC layer) connections between devices. A formalnetworking layer (that functions in each of the three tiers shown inFIG. 1) uses a series of these direct links together with routingdevices to send messages (fragmented or non-fragmented) from one deviceto another over the network.

The distributed network topology also includes a lower tier (edge layer)12 c set of devices that involve fully-functional sensor nodes 18 (e.g.,sensor nodes that include wireless devices, e.g., transceivers or atleast transmitters, which in FIG. 1 are marked in with an “F”) as wellas constrained wireless sensor nodes or sensor end-nodes 20 (marked inthe FIG. 1 with “C”). In some embodiments wired sensors (not shown) canbe included in aspects of the distributed network 11.

The distributed network 11 implements a state machine approach to anapplication layer that runs on the lower tier devices 18 and 20. Statesin the state machine are comprised of sets of functions that execute incoordination, and these functions can be individually deleted orsubstituted or added to in order to alter the states in the statemachine of a particular lower tier device. The state function basedapplication layer uses an edge device operating system that allows forloading and execution of individual functions (after the booting of thedevice) without rebooting the device (so-called “dynamic programming”).In other implementations, edge devices could use other operating systemsprovided such systems allow for loading and execution of individualfunctions (after the booting of the device) preferably without rebootingof the edge devices.

Referring to FIG. 2, a generic constrained computing device 20 that ispart of the security/intrusion/alarm/surveillance systems (eitherintegrated examples of such system or standalone examples) is shown. Aconstrained device 20 as used herein is a device having substantiallyless persistent and volatile memory other computing devices, sensors,systems in a particular networked detection/sensor/alarm system.Constrained device 20 includes a processor device 21 a, e.g., a CPU andor other type of controller device that executes under an operatingsystem, generally with 8-bit or 16-bit logic rather than the 32- and64-bit logic used by high-end computers and microprocessors. Theconstrained device 20 has a relatively small flash/persistent store 21 band volatile memory 21 c in comparison with other the computing deviceson the network. Generally the persistent store 21 b is about a megabyteof storage or less and volatile memory 21 c is about several kilobytesof RAM memory or less.

The constrained device 20 has a network interface card 21 d thatinterfaces the constrained device 20 to the network 11. Typically awireless interface card is used, but in some instances a wired interfacecould be used. Alternatively, a transceiver chip driven by a wirelessnetwork protocol stack (e.g., 802.15.4/6LoWPAN) can be used as the(wireless) network interface. These components are coupled together viaa bus structure. The constrained device 20 also includes a sensor 22 anda sensor interface 22 a that interfaces to the processor 21 a. Sensor 22can be any type of sensor type device. Typical types of sensors includetemperature, simple motion, 1- 2- or 3-axis acceleration force,humidity, pressure, selective chemical, sound/piezo-electrictransduction, and/or numerous others, implemented singly or incombination to detect complex events.

The disclosed implementations of a constrained device 20 can follow thecurrent constraints on flash/persistent storage memory and RAM memoryand less than 10-20 kilobytes of RAM/volatile memory, but can have moredepending on configuration and in some instances the operating system.These constrained devices 20 are configured in this manner; generallydue to cost/physical configuration considerations. These types ofconstrained devices 20 generally have a static software image (i.e., thelogic programmed into the constrained device is always the same).

Constrained devices 20 execute a real-time operating system that can usedynamic programming and support. The real-time operating system (“RTOS”)executes and otherwise manages a dynamic set of user-defined independentexecutable functions or tasks that are either built into a loaded image(software and RTOS that executes on the constrained device) or that aredownloaded during normal operation of the constrained device 20 or acombination of the two, with the former (built into the image) using assubroutines instances of the latter (downloaded during operation).Certain of the applications set forth below will cause systems to accessthese constrained devices 20 to upload data and otherwise control thedevices 20 according to needs of the applications.

In the examples below, a facility can be any type but is typically,e.g., a commercial, industrial, facility, with interior areas,(buildings) and exterior areas that are subject to surveillance andother types of monitoring. The buildings can be of any configuration,wide open spaces such as a warehouse, to compartmentalized facilitiessuch as labs/offices.

Referring now to FIG. 3, using mixed reality system technology and usingmixed reality device 13 a as an example, a virtual “holographic guardtour” is provided. Cloud servers 14 receive 32 from a given facility, aplurality of video feeds, each of which originates from a correspondingplurality of surveillance cameras at the given facility. Included withthe video feeds are data including location data that specifies thelocation and an identification data that identifies the surveillingcamera. The cloud servers 14 process 34 these data using conventionprocessing analytics for determining either potential of alarmconditions or verification of asserted alarm conditions. At least someof these feeds received by the cloud servers are sent 36 by the cloudservers 14 to corresponding mixed reality devices 13 a-13 c that areworn by personnel, e.g., personnel at monitoring centers. In someinstances the mixed reality devices 13 a-13 c send messages to theservers 14 to send specified video feeds from specified cameras to thecorresponding mixed reality device 13 a.

Referring now to FIG. 4, these feeds are received 52 from the cloudservers by the corresponding mixed reality devices 13 a-13 c. Thepersonnel at monitoring centers can access the video feeds in anorganized manner (along with other sensor data from sensors in proximityto such cameras deployed in a given surveilled facility, e.g., abuilding or a facility). The mixed reality device 13 a enters a mode inwhich personnel at the monitoring centers arrange 54 the video feeds andother sensor data on a virtual wall of “video monitors.” That is, thefeeds are rendered in the display of the corresponding mixed realitydevice 13 a as being affixed to the virtual wall at fixed locations in adisplay generated by the corresponding display device of the mixedreality devices 13 a, as shown in FIG. 5.

The user observes this data that is received from a protected buildingto conduct surveillance for potential intruders or other security orsafety issues. As these feeds are pinned to the same section of thevirtual wall, so that when monitoring personnel are ready to view thefeeds, the feeds are rendered in the same positions on the wall, eachtime the video is rendered.

A user can select one of the virtual video monitors on the wall forcloser examination. That is, the user of the mixed reality device 13 acan cause the mixed reality device 13 a to enter a mode by which camerason the mixed reality device 13 a, capture user gestures that signal themixed reality device 13 a to select 56 one of the virtual monitors to berendered on the display while removing others, in order that detailedobservations can be made by the user. Upon receiving a selection of thevirtual monitor, the mixed reality device 13 a wipes 58 the displayclear of the prior display and places the selected virtual monitor inthe display, so that the user can focus in on a signal display from asingle camera.

At various stages and in various modes, monitoring personnel view 60 thefeeds at the locations through mixed reality device. The mixed realitydevices 13 a-13 c pull other data from the servers 14 or the serverspush other data to the mixed reality devices 13 a-13 c. Video sensorpositioning (camera positioning) can be controlled 62 via mixed realitydevices 13 a-13 c to vary a field of view through the display on themixed reality devices 13 a-13 c and to otherwise control actions fromthe mixed reality devices, either via command or gestures or controls orvoice commands.

The user of the mixed reality device 13 a can cause the mixed realitydevice 13 a to enter another mode by which again using cameras on themixed reality device 13 a, the user can signal the cloud computers tocontrol positioning of camera (assuming that the camera isrepositionable type of camera, e.g., a camera that is mounted on aswivel mount. In this aspect, the camera on the mixed reality device 13a receives the gesture commands through images. The mixed reality device13 a either sends commands derived from a translation of the capturedimages or sends the images directly to the cloud servers, whichtranslate the images into the commands. The commands are formed intosignals that are sent from the cloud servers to the corresponding camerato control positioning of the camera.

Referring now to FIG. 5A, the display 70 of the mixed reality device 13a is shown. In display 70 is rendered, here four video feeds 72 a-72 dare illustrated and that are affixed to sections of a virtual wall 76.As shown in FIG. 5B, selection of the video feed 72 a as illustratedrenders the video feed 72 a as illustrated as occupying a substantialportion of the virtual wall 76.

In some implementations, especially for larger facilities, the cloudcomputers, using conventional modeling processes, construct a virtual,visual 3D model of the facility. This model is rendered for viewing inthe mixed reality devices 13 a-13 c. Clicking on areas of the facilityallows the monitoring employee to view corresponding camera feeds fromthe corresponding areas of the building.

A guard tour can be performed using drone based camera system (or otherportable based systems). The surveillance system uses one or more UAV'sor drones. A UAV (unmanned aerial vehicle) commonly known as a drone isa remotely piloted airborne vehicle, i.e., an aircraft that does nothave a human pilot aboard. However, a human controls the flight of thedrone remotely or in some applications the flight of the drone iscontrolled autonomously by onboard computers. The display in the mixedreality system receives a video feed from a camera carried by the drone.A mechanism for steering the drone around the facility is provided suchas by use of waypoints.

The drone navigates via waypoint stations that provide bases for one ormore of the plural drones. The system also includes a cloud based serverthat is in communication with the drones and a gateway to send data toand receive data from a remote, central monitoring station (alsoreferred to as central monitoring center) via one or more data orcommunication network, such as the Internet; the phone system orcellular communication system being examples of others. The serverreceives signals from the plural drones. These signals include videosignals from onboard cameras as well as location information. Navigationof such drones can be provided as disclosed in U.S. Pub. No.US-2016-0116914-A1, incorporated herein by reference. The drone takesthe place of the “live” security guard.

The drones can carry several types of sensor/detectors. One type ofsensor is a video camera that sends video data to the server. Examplesof other types of sensors include microphones to send audio data. Thesensors communicate wirelessly via an on-board computer on the drone tothe gateways up to the cloud based servers. In general, sensors captureaudio and video and send signals to the servers.

The mixed reality system is configured for a specific drone or set ofdrones, such that the mixed reality system receives preconfigured videofeeds from the drone(s) that are pinned to the same location on a wall.The drones can be assigned routes and can have various modes such ashover mode, track mode, etc. Drone cameras can be pulled into the mixedreality system either by the mixed reality system being preconfigured tospecific drones or the mixed reality system upon commands (gestures,selections on the mixed reality system, etc.) by the user to selectspecific drones.

Referring now to FIG. 6, an AR/VR (mixed reality) session manager system80 (session manager) 80 that executes on the servers 14 is shown. Thesession manager 80 interacts with the mixed reality devices 13 a-13 cover the Internet using a “session portal” 82, e.g., a web service(application programming interface (API) or in another embodiment, adedicated socket with SMTP or other transfer protocol. The sessionportal 82 is bi-directional meaning that each of the mixed realitydevices (MRS) 13 a-13 c can send data to the session manager 80 andreceive data from the session manager 80. The mixed reality devices(MRS) 13 a-13 c send updates on their states to the session manager 80.The states of the mixed reality devices 13 a-13 c are representedvirtually or “mirrored” in a device state representation 84 inside thesession manager 80.

Input from the mixed reality devices (MRS) 13 a-13 c to the sessionmanager 80 is used in analytic programs executed on the servers 14. Forexample, while cameras in the facility can be sending video feeds to theservers that send relevant data to the mixed reality devices (MRS) 13a-13 c, cameras on the mixed reality device 13 a-13 c may send video ofan area showing the current state of the facility being monitored by thesecurity system. This video can be analyzed by input analyzer 86 usingvarious techniques to inform analytical manager 88 that inputs toanalytic programs (not shown) executing on the servers 14. The analyticsmanager 88 uses a current mode and inputs presented to it, in order todecide what to present (virtually) to the user on the device viewer andwhat to request of the analytics executing on the server. Informationpresented is produced by the analytics manager using data received fromthe various analytical programs that execute various analytics bothconventional as well as to be developed. The session mode manager 90monitors the mode selected by the user (as mirrored in the device staterepresentation) and informs the analytics manager of the selection.Session logs and notes (not referenced) can also be stored.

In some embodiments, the session may be logged by the input analyzer 86,including any notes or annotations provided by at least some users ofthe mixed reality devices 13 a-13 c, e.g., verbal or text sent from themixed reality devices 13 a-13 c or otherwise. This locale log/record inthe session manager 80 may be backed up in an external database 23 orother databases (not shown) for long-term storage, reporting, andfurther analysis. This local session and long-term storage may alsoinclude a full record or “recording” of part or all of the session,rather than just the user notes.

The mixed reality device 13 a-13 c can be controlled via a switch on thedevice, a voice command, and/or a hand gesture that can be used toawakens the device (i.e., loads operating system components and preparesfor input) when the device senses motion or can be used to requestinputs to the device from the servers 14. The device may require inputof a user id and password to enable further operation and interactionwith the user and servers 14.

The sensor network illustrated in FIG. 1, is an example of a networkthat collects and analyzes data from various sensor devices. Otherconfigurations of servers and gateways can be used. In addition, thesession manager system 80 can be implemented in the servers 14 or inlocal or detached server systems.

The servers 14 can be any of a variety of computing devices capable ofreceiving information, such as a server, a distributed computing system10, a rack-mounted server and so forth. Servers 14 may be a singleserver or a group of servers that are at a same location or at differentlocations. Servers 14 can receive information from client device userdevice via interfaces. Interfaces can be any type of interface capableof receiving information over a network, such as an Ethernet interface,a wireless networking interface, a fiber-optic networking interface, amodem, and so forth. Server also includes a processor and memory and abus system including, for example, an information bus and a motherboard,can be used to establish and to control information communicationbetween the components of server.

Processor may include one or more microprocessors. Generally, processormay include any appropriate processor and/or logic that is capable ofreceiving and storing information, and of communicating over a network(not shown). Memory can include a hard drive and a random access memorystorage device, such as a dynamic random access memory computer readablehardware storage devices and media and other types of non-transitorystorage devices.

Embodiments can be implemented in digital electronic circuitry, or incomputer hardware, firmware, software, or in combinations thereof.Computer programs can be implemented in a high-level procedural orobject oriented programming language, or in assembly or machine languageif desired; and in any case, the language can be a compiled orinterpreted language. Suitable processors include, by way of example,both general and special purpose microprocessors. Generally, a processorwill receive instructions and information from a read-only memory and/ora random access memory. Generally, a computer will include one or moremass storage devices for storing information files; such devices includemagnetic disks, such as internal hard disks and removable disks;magneto-optical disks; and optical disks. Storage devices suitable fortangibly embodying computer program instructions and information includeall forms of non-volatile memory, including by way of examplesemiconductor memory devices, such as EPROM, EEPROM, and flash memorydevices; magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and CD ROM disks. Any of the foregoing can besupplemented by, or incorporated in, ASICs (application-specificintegrated circuits).

Other embodiments are within the scope and spirit of the descriptionclaims. For example, due to the nature of software, functions describedabove can be implemented using software, hardware, firmware, hardwiring,or combinations of any of these. Features implementing functions mayalso be physically located at various positions, including beingdistributed such that portions of functions are implemented at differentphysical locations. Other embodiments are within the scope of thefollowing claims.

What is claimed is:
 1. A system, comprising: server computer systemsthat receive video feeds from plural fixed video cameras in a facility,the server computer systems including a storage device that stores aprogram of computing instructions for execution by server computersystem, the program comprising instructions configured to cause theserver computer system to: construct a virtual, visual 3D model of thefacility, the virtual, visual 3D model comprising areas selectable by auser corresponding to areas of the facility; and control a mixed realitysystem comprising a processor device and a memory in communication withthe processor device, and a head mounted display device including astereoscopic 3D display; with the mixed reality system configured to:render using the head mounted display device the virtual, visual 3Dmodel of the facility; receive, from a camera of the head mounteddisplay device, images indicating hand gestures of a user of the headmounted display device; determine a plurality of commands by translatingthe images to identify the gestures; receive a first command of theplurality of commands to monitor video feeds associated with a specifiedarea of the facility via selection of an area within the virtual, visual3D model corresponding to the specified area; send requests to theserver computer system for the video feeds associated with the specifiedarea of the facility; receive the video feeds; receive a second commandof the plurality of commands to pin a specific one of the video feeds toa particular position as rendered on the stereoscopic 3D display; andrender using the head mounted display device, the specific one of thevideo feeds to occupy a substantial portion on the stereoscopic 3Ddisplay by clearing any of the video feeds but the specific video feedfrom the stereoscopic 3D display.
 2. The system of claim 1 whereinincluded with the video feeds are data including location data thatspecifies a location and an identification data that identifies asurveilling camera.
 3. The system of claim 2 wherein the server computersystems process the data using convention processing analytics fordetermining either potential of alarm conditions or verification ofasserted alarm conditions.
 4. The system of claim 1 wherein personnelaccess the video feeds in an organized manner by the mixed realitysystem being configured to: execute a mode that arranges the video feedsand other sensor data on a virtual wall of video monitors that isrendered in the stereoscopic 3D display of the mixed reality system. 5.The system of claim 4 wherein the video feeds are rendered in thestereoscopic 3D display of the corresponding mixed reality system asbeing affixed to the virtual wall at a fixed location in the displaygenerated, by the corresponding mixed reality system, in response to auser pin command received from the user.
 6. The system of claim 4further configured to: receive from a user a selection of the virtualwall of one of the video monitors for closer examination.
 7. The systemof claim 6 further configured to: cause the mixed reality system toenter a mode by which the camera of the head mounted display devicecaptures user gestures that signal the mixed reality system to selectthe one of the virtual monitors.
 8. The system of claim 7 furtherconfigured to: clear the stereoscopic 3D display upon receiving aselection of the virtual monitor and place the selected virtual monitorin the stereoscopic 3D display.
 9. The system of claim 1 furthercomprising: a session manager that controls interactions with the mixedreality system over the Internet using a “session portal” that includesa web service API or a dedicated socket with a transfer protocol.
 10. Amethod performed by a mixed reality system comprising a head mounteddisplay device including a stereoscopic 3D display, comprising:rendering using the head mounted display device a virtual, visual 3Dmodel of a facility, the virtual, visual 3D model comprising areasselectable by a user corresponding to areas of the facility; receiving,from a camera of the head mounted display device, images indicating handgestures of a user of the head mounted display device; determining aplurality of commands by translating the images to identify thegestures; receiving a first command of the plurality of commands tomonitor video feeds associated with a specified area of the facility viaselection of an area within the virtual, visual 3D model correspondingto the specified area; sending requests to a server system for the videofeeds associated with the specified area of the facility; receiving thevideo feeds; receiving a second command of the plurality of commands topin a specific one of the video feeds to a particular position asrendered on the stereoscopic 3D display; and using the head mounteddisplay device to render the specific one of the video feeds to occupy asubstantial portion on the stereoscopic 3D display by clearing any ofthe video feeds but the specific video feed from the stereoscopic 3Ddisplay.
 11. The method of claim 10, wherein the video feeds are dataincluding location data that specifies a location and an identificationdata that identifies a surveilling camera.
 12. The method of claim 11,wherein the server computer system process the data using conventionprocessing analytics for determining either potential of alarmconditions or verification of asserted alarm conditions.
 13. The methodof claim 10, further comprising: executing a mode that arranges thevideo feeds and other sensor data on a virtual wall of video monitorsthat is rendered in the stereoscopic 3D display of the mixed realitysystem.
 14. The method of claim 13, wherein the video feeds are renderedin the stereoscopic 3D display of the corresponding mixed reality systemas being affixed to the virtual wall at a fixed location in the displaygenerated, by the corresponding mixed reality system, in response to auser pin command received from the user.
 15. The method of claim 13,further comprising: receiving from a user a selection of the virtualwall of one of the video monitors for closer examination.
 16. The methodof claim 15, further comprising: entering a mode by which the camera ofthe head mounted display device captures user gestures that signal themixed reality system to select the one of the virtual monitors.
 17. Themethod of claim 16, further comprising: clearing the stereoscopic 3Ddisplay upon receiving a selection of the virtual monitor and placingthe selected virtual monitor in the stereoscopic 3D display.
 18. A mixedreality system, comprising: an interface coupled to at least one servercomputer that receives video feeds from video cameras in a facility; astorage device that stores a program of computing instructions forexecution a processor, the program comprising instructions configured toa head mounted display device including a stereoscopic 3D display to:render using the head mounted display device a virtual, visual 3D modelof the facility, the virtual, visual 3D model comprising areasselectable by a user corresponding to areas of the facility; receive,from a camera of the head mounted display device, images indicating handgestures of a user of the head mounted display device; determine aplurality of commands by translating the images to identify thegestures; receive a first command of the plurality of commands tomonitor video feeds associated with a specified area of the facility viaselection of an area within the virtual, visual 3D model correspondingto the specified area; send request to the server for the video feedsassociated with the specified area of the facility; receive the videofeeds; receive a second command of the plurality of commands to pin aspecific one of the video feeds to a particular position as rendered onthe stereoscopic 3D display; and render using the head mounted displaydevice, the specific one of the video feeds to occupy a substantialportion on the stereoscopic 3D display by clearing any of the videofeeds but the specific video feed from the stereoscopic 3D display. 19.The system of claim 18, wherein the video feeds comprise data comprisinglocation data that specifies a location and an identification data thatidentifies a surveilling camera.
 20. The system of claim 18, wherein themixed reality system is configured to: execute a mode that arranges thevideo feeds and other sensor data on a virtual wall of video monitorsthat is rendered in the stereoscopic 3D display of the mixed realitysystem.