EP2011093B1 - Sicherheitsüberwachung mit programmierbarem mapping - Google Patents

Sicherheitsüberwachung mit programmierbarem mapping Download PDF

Info

Publication number
EP2011093B1
EP2011093B1 EP07751528.6A EP07751528A EP2011093B1 EP 2011093 B1 EP2011093 B1 EP 2011093B1 EP 07751528 A EP07751528 A EP 07751528A EP 2011093 B1 EP2011093 B1 EP 2011093B1
Authority
EP
European Patent Office
Prior art keywords
image
mapping database
capture
sensor
sensors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP07751528.6A
Other languages
English (en)
French (fr)
Other versions
EP2011093A2 (de
EP2011093A4 (de
Inventor
Keith Jentoft
Jean-Michel Reibel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RSI Video Technologies Inc
Original Assignee
RSI Video Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/388,764 external-priority patent/US7463145B2/en
Priority claimed from US11/389,673 external-priority patent/US7835343B1/en
Application filed by RSI Video Technologies Inc filed Critical RSI Video Technologies Inc
Publication of EP2011093A2 publication Critical patent/EP2011093A2/de
Publication of EP2011093A4 publication Critical patent/EP2011093A4/de
Application granted granted Critical
Publication of EP2011093B1 publication Critical patent/EP2011093B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves

Definitions

  • the present invention is directed to a security arrangement and method for monitoring the inside of a facility or residence.
  • monitoring devices such as cameras, motion sensors, keypads or contact sensors.
  • Many buildings have multiple locations that are monitored for security purposes, requiring multiple monitoring devices in the different locations.
  • the monitoring devices can be configured to communicate with one or more central control devices.
  • the central control device can, among other things, perform monitoring or recording functions, determine whether the building-security has been breached and whether to contact security personnel.
  • One method of communicating between the monitoring devices and the central control device is by a physical connection, such as electrical or other wiring.
  • a physical connection such as electrical or other wiring.
  • Using wiring to establish communication between the security devices can be troublesome for a number of reasons, such as the high cost of installation and maintenance. For example, exposed wiring is often unacceptable in a building, and thus, the installation of the security system requires passing the wires through the walls of the building. This type of installation can significantly increase the time required-to-oomplete a security system installation. Moreover, the troubleshooting and repair of the security system can be difficult because there is limited access to the unexposed wiring. The cost of the wire is another factor, especially in large buildings requiring numerous monitoring devices.
  • wireless security systems also have a set of problems, such as battery life.
  • the security devices would be self-powered by, for example, a battery.
  • Self-powered devices are more secure because they are not subject to failure upon loss of power to the building. They also require less installation problems because they do not need to be connected to a separate power source; however, self-powered devices often have reliability issues due to the finite life of their power source.
  • Increasing the useable time of a power source reduces the cost for replacement of the power source and increases the security of the entire system by having less potential downtime of the system or its components.
  • monitoring devices that contain digital cameras require enough power to run the camera, to store the digital picture in memory and to transmit the digital picture to the control device.
  • a wireless building-security system can be further complicated by industry or government regulations.
  • One such set of regulations is imposed by the Federal Communications Commission (FCC).
  • FCC Federal Communications Commission
  • the current regulations cover numerous aspects of wireless communications systems including, but not limited to, a range of restricted frequencies, a minimum number of different hopping frequencies within the allowable frequencies, the maximum output power of a transmitter and a requirement related to equal use of the hopping frequencies.
  • security monitoring systems are used to monitor a variety of facilities and to sense the presence of unwanted intruders. Many such security systems are connected to a central control unit and monitored by an operator who can alert the appropriate emergency services in the event of an unwanted intruder.
  • a home monitoring security system includes a combination of sensing devices and alarm devices and some also include cameras. To achieve the maximum monitoring coverage, these devices are distributed throughout the interior of the facility.
  • Security systems that employ cameras are advantageous in that they are able to record activity associated with a suspected breach of the facility and also can be used by a monitoring station to prevent false alarms. In some instances, however, the cameras record the regular activities of the facilities' residents and/or employees. The cameras also record activities that are falsely perceived to be security breaches such as pet behaviors and authorized users that have been accidentally locked out.
  • US 2005/0162268 discloses a video surveillance system, wherein at least one sensor condition defines an alarm state for each camera.
  • the present invention is directed to the above and related types of integrated security systems.
  • the present invention provides an integrated security arrangement as claimed in claim 1.
  • the present invention also provides an integrated security arrangement as claimed in claim 11.
  • an integrated security arrangement includes an intrusion sensor to detect an intrusion, a plurality of motion sensors, and a plurality of image-capture devices. Each of the image-capture devices is responsive to a respective one of the motion sensors and when the image-capture devices are enabled they capture images of respective target areas in response to movement in the respective target areas as indicated by the respective motion sensors.
  • the integrated security arrangement also includes a mapping database that contains data used to associate one or more of the plurality of image-capture devices with the intrusion sensor. The mapping database is configurable by a user.
  • the integrated security arrangement further includes a control unit that enables one or more of the plurality of image-capture devices in response to the intrusion sensor detecting an intrusion. The control unit determines whether to enable one or more of the image-capture devices based upon data in the mapping database.
  • the present invention is believed to be applicable to a variety of different approaches and arrangements for providing security services.
  • the invention has been found to be particularly advantageous for addressing security monitoring needs in a residence or private-office environment.
  • a security system utilizes cameras to detect and identify intruders.
  • the system includes an integrated camera/motion detector that is responsive to intrusion sensors and other types of sensors/alarms (e.g., a smoke detector, a carbon monoxide detector, a gas detector, or a panic button).
  • intrusion sensors e.g., a smoke detector, a carbon monoxide detector, a gas detector, or a panic button.
  • sensors/alarms e.g., a smoke detector, a carbon monoxide detector, a gas detector, or a panic button.
  • the integrated camera/motion detector being responsive to intrusion detection; however, the discussion is equally applicable to the integrated camera/motion detector being responsive to other types of sensors and alarms as well.
  • the camera's smart-behavior results in reduced power consumption and mitigates privacy concerns on various levels.
  • a system user sets up zones with at least one intrusion sensor (e.g., door/window contacts, glass-break detectors, hyper frequency radar detector, or an infrared barrier) for each zone around the perimeter of a facility and sets up corresponding camera/motion detectors in the interior of the facility.
  • the intrusion sensors are activated (armed) by a system user, using, e.g., a keypad on a security panel, a remote control keyfob, a phone call using DTMF, a personal computer or a remote server. This allows for a complete activation of the system when the system user leaves the facility as well as a partial perimeter activation of the facility when the system user (or other authorized person) is present.
  • the system user enters a code (e.g., using a keypad on a security panel) to identify the desired mode of system operation.
  • the system user enters a system access code and then selects that desired mode of operation from a display.
  • the arrangement includes an intrusion sensor to sense an intrusion at a target area of a facility, a second sensor to sense movement, an image-capture device, and a base unit.
  • the image-capture device captures images in response to an intrusion indication from the intrusion sensor and in response to a movement indication from the second sensor.
  • the base unit integrates a direction of view of the second sensor and of the image-capture device, thereby directing the second sensor to sense in the target area in which the images are captured by the image-capture device.
  • FIG. 1 depicts a building-security system according to an example embodiment of the present invention.
  • FIG. 1 includes building 100, control panel 102, and peripheral devices 104-110.
  • the security system is implemented in such a manner so as to reduce the power consumption of one or more of the control panel and peripheral devices as related to the wireless communications between the devices.
  • the devices use multiple frequencies (channels) as well as communication intervals.
  • the devices are able to reduce the power consumption by utilizing information regarding a specific frequency from the multiple frequencies used and the communication interval. For example, if the transmitting devices modify their transmissions based upon the information, a receiving device may reduce the power consumption by decreasing the time the receiving device is listening for a transmission from another device.
  • the system lends itself to implementing bi-directional communications between the devices, which typically require more power consumption than unidirectional communications.
  • the jagged lines and ellipses found between control panel 102 and the peripheral devices represent wireless communications between the control panel and the peripheral devices.
  • the wireless communications may be implemented using suitable frequencies. For instance, wireless communications frequencies in industrial, scientific and medical (ISM) radio bands (900Mhz, 2.4Ghz and 5.8Ghz) have been found to be suitable for security systems; however, alternate frequencies may be implemented in accordance with the particulars of the system or its intended implementation.
  • ISM industrial, scientific and medical
  • peripheral devices and the control panel are implemented using one or more of electric circuit arrangements, processors, memory elements, software code, programmable logic devices, input/output interfaces or combinations thereof.
  • Building 100 represents a facility for which the building-security system is implemented. Common implementations of building 100 include, but are not limited to, residential homes, retail stores, office buildings, government buildings, museums and other facilities. Typically, the security system will monitor several locations within building 100. Accordingly, FIG. 1 depicts various peripheral devices throughout the building.
  • Peripheral communications devices 104-110 may take the form of a variety of different devices, a few of which are depicted in FIG. 1 .
  • device 104 depicts a window sensor that may, among other things, detect when the window has been opened or otherwise compromised;
  • device 106 depicts a camera for video capture;
  • device 108 depicts an alarm;
  • device 110 depicts a mobile peripheral, such as a key fob for interfacing with the control panel or another peripheral.
  • Other example sensors include but are not limited to fire alarms, carbon dioxide sensors and panic buttons. These peripheral devices communicate with control panel 102 using wireless communications.
  • Block 112 depicts several elements that may be implemented in the peripheral devices, including a transceiver block, a message protocol block, a synchronization block and a transmit (Tx) anticipation block.
  • a peripheral device wirelessly transmits a signal using the transceiver block.
  • the peripheral device uses information regarding a transmission period and the listening channel of the control panel in the transmission process.
  • the peripheral devices transmit building-security information to the control panel.
  • device 106 might transmit video images or device-status information to the control panel, while device 104 might transmit information relating to the window's sensor.
  • FIG. 1 depicts control panel 102 as including a transceiver block, a message protocol block, a synchronization block and a transmit (Tx) anticipation block.
  • the transceiver block is used for receiving signals from one of the peripheral devices as a function of the communication intervals and the frequency the control panel uses to listen for transmissions.
  • the listening frequency is one of several potential frequencies available for communication between the peripheral devices and the control panel.
  • the system may use a number of contiguous frequency slots (channels) within a suitable frequency band.
  • One example of such a use includes 25 or more channels within the ISM frequency band from 902-928 MHz. Numerous other combinations of channels and frequency bands are possible using the present invention.
  • the control panel and peripherals are implemented using a similar set of elements as depicted by blocks 102 and 112; however, various components may be implemented differently.
  • the synchronization block can be implemented differently in the control panel versus the peripheral devices where the control panel provides synchronization information to each of the peripherals and the peripherals must use the synchronization information to maintain synchronization using a local clock.
  • the peripherals would compare the synchronization information with the local clock in order to compensate for any difference between the peripherals' time frames and the control panel's time frame.
  • the synchronization information can take the form of a time index, such as a counter value, a current time of day or any other time based data which the peripheral can use as a reference for synchronization.
  • the time index can be a reference within each message transmitted.
  • the peripheral device can compare when the message was received to when the message was expected.
  • the peripheral device may also be configured to adjust the local clock using a compensation for a timing error. For instance, if the peripheral clock appears to be running slower than the control panel, the peripheral can compensate by increasing the clock frequency or using a counter to compensate for the differences between clocks.
  • control panel and the peripheral blocks are depicted as having a transceiver; however, the system may be implemented using variations of receivers and transmitters.
  • a peripheral may be implemented with only a transmitter.
  • a peripheral may be implemented with only a receiver.
  • Other implementations allow for one or more of the control panels and peripherals to have both a transmitter and receiver (transceiver).
  • transceiver is used herein to describe a receiver, transmitter or both a receiver and transmitter.
  • One embodiment of the present invention reduces the power of one of the devices as a function of the listening channel and a communications period.
  • the system decreases the length of time that a receiver is active by using the communications period and listening channel to reduce the window of time necessary to receive the start of a transmission.
  • various methods of power reduction are employed, such as removing power from the receiving devices or reducing or stopping selected functions (e.g., amplification or processing).
  • the synchronization can further reduce the active time of the transmitter because, for example, the transmitter may limit the transmission times relative to the times for which the receiver is active. Such a reduction can be accomplished because, for example, in many systems the transmission time cannot be shorter than the Rx activation period of the receiver without knowledge of when the Rx activation occurs; however, synchronization can reduce the transmission times to less than the Rx activation period of the receiver.
  • the control panel sends periodic synchronization messages to the peripheral devices.
  • a peripheral device that determines it has lost synchronization with the control panel can increase the active time of the receiver to compensate for the loss in synchronization. In the event that the peripheral device is no longer receiving synchronization messages, the device can increase the active receive time to ensure that a transmission from the control panel will be received.
  • the peripheral device can increase the activation time based upon an expected accuracy of the local tracking (e . g ., local clock) of the control panel time-base. For instance, where the expected accuracy of the local tracking is relatively high, the peripheral device increases the activation time only upon the loss of several synchronization messages.
  • Some devices such as a keyfob or other handheld device (110) are portable and are often removed from the wireless communication range of the rest of the system or may cease to receive or transmit information in response to a period of inactivity. Thus, the portable devices often lose synchronization during the time they are unable to communicate with the control panel. Accordingly, such portable devices frequently increase the activation time to compensate for the lack of synchronization between the portable devices and the control panel. The frequent increase in activation time often leads to a high rate of power consumption. To compensate, portable devices can be implemented to shut down transmission monitoring efforts until an external action occurs, such as a button being pressed.
  • the messages sent by the control panel are received by multiple peripheral devices simultaneously. Where the message is not intended for all the peripherals, the message can include information that indicates for which peripheral the message is intended. The message can also be associated with a channel that the control panel uses for an acknowledge message from the peripheral.
  • FIG. 1A illustrates an example embodiment of an integrated security system, according to the present invention.
  • a base unit 35 is located in the interior of a facility and integrates a motion sensor 20, a camera 25 (e.g., CCD camera), a data processor 30, and a communication interface 15.
  • the motion sensor is a passive infrared (PIR) sensor, which detects infrared energy in a target area and, in connection with a processor 30, recognizes changes in infrared energy (e.g., temperature changes) to detect motion.
  • PIR passive infrared
  • multiple base units are located throughout the facility's interior, with a control panel 45 acting as a conventional communication hub for the facility.
  • the control panel 45 interfaces with the base unit 35 via communications interface 15.
  • the control panel 45 arms motion sensor 20 allowing the motion senor to activate the camera 25 when movement is detected.
  • the control panel 45 can also directly activate the camera 25 ( e.g., without regard to motion sensor 20).
  • the base unit 35 can receive the intrusion sensor input 10 via communications interface 15. The sensor input 10 can therefore inform either the base unit 35 or the control panel 45 to arm the motion sensor 20 and/or activate the camera 25.
  • the motion sensor 20 When unarmed, the motion sensor 20 will not be able to activate camera 25 but may still detect motion.
  • the motion sensor 20 can detect motion in its field of view, and once the motion sensor is armed, the motion sensor is able to activate the camera 25.
  • the motion sensor 20 and the camera 25 are positioned such that both devices have overlapping fields of detection. Thus, images of the source of the detected motion are recorded by the camera without requiring any intervening adjustment or alignment
  • the recorded images are processed by a data processor 30, which can be integrated with the motion sensor 20 and the camera 25 in a base unit 35 as shown, or may be located remotely and electrically coupled to the base unit 35.
  • the data processor 30 can be implemented, for example, in the form of a high-speed processor such as a DSP (including an ALU) and/or a more general-purpose processor that may be optionally programmed for video data (de)compression.
  • various embodiments may include a variety of combinations of processing operations with one or more aspects of the processing operations performed at one or more local or remote processors.
  • both video data storage and compression may be performed in the base unit 35 by the data processor 30.
  • the processor is located remotely, the data storage may still occur in base unit 35, but compression of the video data could be implemented in the remote processor.
  • Another embodiment may involve data storage in the base unit 35 without any compression of the video data.
  • each of the above operations may be performed in combination with a central processor 55, as further discussed below.
  • the base unit 35 is a battery-operated, wireless device having both motion sensing and image-capture capabilities.
  • data processor 30 is configured to preserve battery life by communicating in accordance with appropriate power-saving protocols.
  • U.S. application serial no. 11/389,673 filed on March 24, 2006 entitled "Spread Spectrum Communications for Building-Security” and European Patent Application Publication No.
  • the recorded images are transmitted over a bi-directional sensor communication path 40 to a control panel 45.
  • the sensor communication path 40 is wireless and can be employed, e . g ., as described in the above two incorporated patent documents.
  • the transmitted images may be encrypted by the data processor 30 before being transmitted to the control panel 45.
  • the control panel 45 includes a local storage area for the recorded images 50, the central processing unit 55, and a transceiver 60.
  • the control panel 45 is located within the same facility as the base unit 35.
  • the central processor 55 receives images from each of the base units located within the facility. Similar to the above discussion, the central processor 55 may perform a variety of processing operations alone or in combination with data processor 30.
  • the images may optionally be stored in data storage 50 for further review or processing.
  • the control panel 45 includes a battery backup power source 65 in the event of a loss of power, e.g., a natural disaster or an intruder disables power to the facility.
  • the transceiver 60 further transmits signals including system status reports or recorded images via a telephone channel 70 or cable channel 75 to outside monitoring facilities.
  • the telephone channel 70 and cable channel 75 are not limited to PSTN or broadband channels; they may be part of a GSM/CDMA network.
  • Outside monitoring facilities may include a private security company or a local law enforcement station.
  • the intrusion signal 10 is transmitted directly to the control panel 45.
  • the control panel 45 arms one or more base units 35 in the same zone as where the intrusion signal (via sensor 10) originated.
  • the control panel 45 can arm the sensor 20 of base unit 35 in that room, as well as the sensors of the base units located in adjacent rooms and/or the hallway outside the room. In this manner the system can track intruders as they move throughout the facility.
  • the base unit(s) 35 respond as discussed above.
  • control panel 45 is the master and the sensors and control devices (e.g., keypads, keyfobs) are slave devices.
  • the radio link in this architecture is a star topology with the control panel 45 at the center of the network.
  • the branches include base units 35 and external links, e . g ., telephone channel 70 and broadband channel 75.
  • an embodiment is arranged with an intrusion sensor to sense an intrusion at a target area of a facility, a second sensor to sense movement, and an image-capture device.
  • the second sensor bears a special relationship (e.g., located sufficiently near and aligned) with the image-capture device to form a common field of view, such that the fields of view for both devices overlap without the devices being located inside a common housing.
  • the image-capture device captures images in response to an intrusion indication from the intrusion sensor and in response to a movement indication from the second sensor.
  • the various arrangements permit for the devices to be situated in different ways to provide the common field of view.
  • horizontal movement, vertical movement, or horizontal and vertical movement can be provided for each of the motion sensor and the image-capture device, with their movements mirrored to maintain the integrated field of view.
  • mirrored movement can be provided by using a ratchet-like mechanism with devices to provide increment adjustments in the horizontal and/or vertical directions; the skilled artisan would appreciate that such adjustment can be implemented using servo-control motors or be manually implemented using conventional position-stabilizers that permit step-wise/incremental rotation.
  • horizontal movement, vertical movement, or horizontal and vertical movement can be provided for either or both the motion sensor and the image-capture device by way of conventional electronically-implemented pan/tilt/zoom operation(s), with their movements coordinated to maintain the integrated field of view.
  • pan/tilt/zoom operation is commonly used in digital video-recording devices.
  • the motion detector may also be manipulated to alter the field of view.
  • the various arrangements can be implemented with a spatial relationship between the motion sensor and the image-capture device by using a common backplate to which each of the motion sensor and the image-capture devices are mounted and/or a template for aligning the motion sensor and the image-capture device for mounting on a wall, where contoured portions of the respective backs of the motion sensor and the image-capture device may provide an offset for biasing the direction of view.
  • the various arrangements permit for such above-described devices to be situated such that their movement is pre-set before they are used or dynamically controlled while in use with automated or semi-automated coordination provided by the control circuitry and/or personnel at a remote-site center.
  • Such coordinated movement while maintaining a common field of view, benefits a variety of monitoring and/or security applications.
  • an intrusion sensor such as a window or door contact, located at a perimeter of a facility detects whether the contact subject, window or door, has been breached. If, for example, a window has been opened, the window contact (intrusion sensor) sends a signal to a corresponding integrated motion sensor/camera located at the interior of the facility. Upon receipt of the intrusion signal, the motion sensor is armed and the integrated camera is set to a "ready" mode without initiating recording. The motion detector remains armed and when motion is detected, the integrated motion sensor/camera is again triggered. Once motion is detected, the camera turns "on” and captures images of the source of the motion. The video images are sent to a central control panel for further evaluation.
  • the window contact intrusion sensor
  • Further evaluation may include determining (manually or automatically using, e.g., machine visions) whether the source of the motion is human, an animal such as a pet, or another moving object. If the source is determined to be human, further evaluation may reveal whether any identifying images were captured, whether the human is an intruder or an inhabitant of the facility, and face recognition may be used to identify a previously unknown person intruding on the facility.
  • the home entry intrusion sensor corresponds to a delayed-respqnse motion sensor such that the transmission of the motion indication is delayed to accommodate a security system control keypad located near the entrance.
  • the motion indication is not delayed when motion is detected.
  • the system recognizes that motion sensed in the nearby room (e.g., person setting grocery bags down in the kitchen) following a delayed sensing of motion in the entry zone is likely an authorized user and an alarm will not sound for a predetermined length of time. If the system is not deactivated or reset before the predetermined length of time expires, the alarm will sound.
  • the number of nearby zones configured with such a relationship with the delayed motion indication in the entry zone should be limited to ensure that an actual intruder is not provided enough time to traverse the premises without being detected.
  • the security system is equipped to capture an image of the person arming or disarming the system (e.g., by entering a code on a security system control keypad) to determine if the person is an authorized user.
  • the captured image can be sent to a remote monitoring station for verification or stored for future reference.
  • the security system can be programmed with images of the authorized users and the system uses face recognition to compare the captured image of the person attempting to arm/disarm the system with the images of the authorized users to determine whether the person is an authorized user. If the person's image matches that of an authorized user, then the person is allowed to arm/disarm the system.
  • the security system control keypad is equipped with a camera to capture an image of the person entering a code.
  • a base unit 35 is positioned such that the base unit's camera 25 can capture an image of the person entering a code on the security system control keypad.
  • the security system control keypad activates the camera 25 to capture an image of the person entering the code.
  • the security system is equipped with a self diagnostic mode that is used to determine if the system is functioning properly.
  • the system sends test signals representing intrusion detections by various sensors to the base stations 45 to determine that the appropriate sensors 20 are armed and/or the appropriate cameras 25 are activated.
  • the system can also enable each of the cameras 25 to capture an image to check that the cameras are working.
  • the results of the diagnostic tests can be displayed for the system user, saved for future review or provided to a remote monitoring station.
  • FIG. 2 shows a block diagram of a security system for mapping a plurality of sensors to a camera, according to an example embodiment of the present invention.
  • Control block 206 interfaces with sensors 204 (i.e., sensor(1) to sensor(N)) and camera 202.
  • Control block 206 receives input from sensors 204 regarding the status of the sensor. For instance, a particular sensor may send a message to control block 206 in response to a window or door being opened. Control block 206 can then make a determination as to whether camera 202 should be activated.
  • control block 206 has a mapping or lookup table that links one or more of the sensors to camera 202.
  • control block 206 can receive images from camera 202 and also forward the images to a monitoring station, using a telephone or network interface.
  • camera 202 is able to pan, tilt, zoom or otherwise change the field of view to correspond to the particular sensor that was triggered.
  • sensors 204 and camera 202 announce their presence to control block 206 during an initialization stage.
  • a user of the system can select from these devices when determining what sensors camera 202 should be configured to respond to.
  • a graphical user interface can be used to allow for ease of configuration.
  • a graphical display of the location of the sensors 204 and camera 202 can be used to allow a user to easily select and configure the system.
  • Such configuration can be limited to implementation during installation of the security system, or can be implemented throughout the use of the security system.
  • sensors 204 can optionally be wireless, it is possible that the sensors may be moved from time to time. This may be necessary where the function of a room changes or where the structure undergoes changes.
  • sensors can be added or replaced at later dates.
  • camera 202 can operate in different modes that may or may not be responsive to sensors 204. For example, one mode may disable camera 202 completely, while another mode may enable camera 202. One such mode would include control block 206 enabling cameras 202 in response to one or more selected sensors 204. In one embodiment of the present invention, different modes may have different sensors mapped to camera 202. For instance, one mode may have a door sensor mapped to camera 202, while another mode may have both a door sensor and a motion sensor mapped to camera 202 ( e.g., for when there should be no authorized occupant in the area). The system can be programmed such that a different code is used to identify each of these modes of operation.
  • the system user enters one of the codes (e.g., on a security system control keypad) to select the desired mode of operation.
  • the system user enters a security access code and then selects from one of the programmed modes of system operation that are identified on a display screen ( e.g., by selecting a corresponding icon on a touch screen or by entering a number identifying one of the modes).
  • the system user enters a code for each mode of operation. This can be useful for allowing different levels of access/mode settings for different users. For instance, a child, friend or relative could be given only certain codes. This is particularly useful for controlling access to configuration settings or preventing access during restricted time periods, such as late at night.
  • one of the codes may correspond to a sequence of image captures from various cameras.
  • a user of the system can initiate a sequence of camera shots to view different areas of the facility. This can be particularly useful for assuring a user that there are no intruders or for monitoring the status of an occupant ( e.g., a small child or otherwise vulnerable person) and the house in general ( e.g., to check for fire or damage due to natural disasters).
  • the camera can be enabled in various ways.
  • enabling of the camera includes enabling the camera arrangements discussed in connection with figures 1-3 .
  • the motion detector of the camera arrangement is enabled. If the motion detector senses motion, the camera can then be enabled to capture pictures of potential intruders.
  • the camera can also be configured to immediately capture pictures ( e.g., regardless of the motion detector) in response to the detection of a potential intruder. This can be particularly useful for sensors that do not necessarily correspond to an intruder (e.g., fire alarm) and for high security modes that do not implement a delay or second level of motion detection.
  • the camera would capture images independent of motion detection by the motion sensor.
  • Another mode or setting could be used to distinguish between video capture (e.g., consecutive shots over a period of time capable of showing motion, such as those stored in an MPEG file) and still image capture (e.g., one or more individual images that can be stored using file formats such as JPEG) by the camera.
  • the system in response to a sensor and a selected mode, can be configured to 1) capture images after detecting motion in the field of view, 2) immediately capture video, and 3) immediately capture a still image.
  • FIG. 3 shows a block diagram of a security system for mapping a plurality of cameras to a sensor, according to an example embodiment of the present invention.
  • sensor 302 and cameras 304 i.e., camera(1) to camera(N)
  • control block 306 In response to input from sensor 302, one or more of cameras 304 can be enabled.
  • the control block 306 can implement the desired correspondence between cameras 304 to sensor 302 using mapping database or lookup table. This can be advantageous where the cameras provide different angles of view and/or different fields of view. For instance, in response to window sensor, several cameras can be enabled, allowing for security monitoring stations to view the entire room, and also to have a better chance of identifying a potential intruder.
  • multiple cameras can be selectively linked to multiple sensors. For instance, all cameras and sensors within a room can be linked together. Accordingly, the mapping of both FIG. 2 and FIG. 3 can be used in conjunction with each other.
  • FIG. 4 shows an example mapping or lookup table, according to an example embodiment of the present invention.
  • the data contained in the mapping table can be stored in a suitable memory device, such as flash, random-access-memories, hard drives and the like.
  • a suitable memory device such as flash, random-access-memories, hard drives and the like.
  • nonvolatile memory for guarding against problems due to power loss.
  • Column 402 contains camera-1 to camera-N. It should be noted that FIG. 4 and the relevant discussion make reference to camera-1 to camera-N. As discussed herein, such cameras may include an integrated motion detector, and thus, identification information as to whether the camera device includes such an integrated motion detector may also be stored in the mapping or lookup table.
  • Column 404 contains sensors that are configured to enable the camera arrangement in the corresponding row. For instance, sensors A, B and C would enable camera 1, while sensors X, Y and Z would enable camera 2. In this manner a user of the system provides information as to the desired associations between sensors and cameras resulting in a corresponding change in the data in the mapping table. For example, a graphical user interface can be presented to a user through a software application running on a processor.
  • the processor is a general purpose computer, such as a personal computer or personal digital assistant, that can interface with the control device of the security system using, for example a universal-serial-bus (USB), Ethernet or similar interface.
  • the processor is part of the control device.
  • Column 406 contains additional information regarding relationships between sensors and cameras.
  • column 406 represents sensors that enable the corresponding camera when the security system is in a particular mode (i.e., a different mode than column 404 would be associated with). This is useful to distinguish between situations where the occupants are awake from when they are sleeping, windows that are opened from the inside from windows that are opened from the outside, situations where the occupants are on vacation from when they are not, and the like.
  • column 406 represents sensors that need to be triggered prior to sensors in column 404 activating a camera in column 402.
  • the sensors can be linked to each other, thereby requiring a succession of sensors to be triggered prior to activation of a mapped camera.
  • column 406 represents sensors that are only enabled after a certain delay. This can be particularly useful for enabling sensors that are in the likely path of an intruder. For instance, the camera in a bedroom may be enabled after a window sensor in the bedroom is triggered. After a delay sufficient to allow an intruder to traverse the room, a sensor from column 406 and corresponding to an adjoining room can be enabled.
  • Column 408 represents additional data used to supplement the mapping functions.
  • column 408 may contain information relating to cameras that are only enabled after a certain delay. This can be particularly useful for enabling cameras that are in the likely path of an intruder. For instance, the camera in a bedroom may be enabled after a window sensor in the bedroom is triggered. After a given delay ( e.g., sufficient to allow an intruder to traverse the room) a camera in an adjoining room can be enabled.
  • column 408 may contain data that contains delay values for enabling the cameras or sensor of column 404 and 406.
  • the data in column 408 can be used to denote one or more security modes for which the sensors and cameras stored in the respective mapping table columns are enabled or disabled.
  • a combination of sensor events and the details of the sensor events can be selected to further define enabling events for various cameras.
  • combinational events can be used to determine details, such as whether a series of sensor events represent a person leaving or entering an area. More specifically, the order of sensor events and the absence of certain sensor events can be used to determine the direction a person is traveling, the number of people present and other security factors.
  • the system can be configured to avoid unnecessary video capture of normal occurrences, such as the exit of an authorized person from a secured area, while still capturing abnormal occurrences, such as the entrance of a person to the secured area.
  • mapping table e.g., similar to columns 406 and 408 are possible and only limited by practical considerations, such as complexity and storage space.
  • FIG. 5 shows a flow diagram for logic for implementing a process to enable security cameras in response to mapped sensors, according to an example embodiment of the present invention.
  • Block 502 represents a decision as to whether a sensor has been triggered. The process waits at block 502 for a sensor to be triggered. If a sensor is triggered, the process proceeds to block 504. Block 504 determines whether the sensor is mapped to a camera. If no camera is mapped to the sensor, the process returns to block 502 and waits for another sensor to be triggered. If a camera is mapped to the sensor, the process proceeds to block 506.
  • Block 506 represents potential enable logic.
  • the enable logic depicted by block 506 need not be implemented. In such a case, the process proceeds directly to block 508. In other instances, various determinations, delays and other functions can be carried out at block 506.
  • information stored in a mapping table is used to implement the enabling logic. As discussed herein, such information may represent different logic for different modes, delays before enabling and the like.
  • the logic may determine that no camera should be enabled and the process proceeds to block 510. One such instance is where the security system is in a mode for which the linked camera is not to be enabled. In another instance, the logic may enable other sensors prior to enabling the camera. After determining that the camera should be enabled the process proceeds to block 508 to enable the camera.
  • Block 512 is a logic block similar to block 506, where the process can branch to blocks 510 or 514.
  • Block 514 enables the corresponding camera and returns to block 510 to determine if additional cameras are mapped to the triggered sensor. In this manner, a series of cameras can be enabled in response to one or more triggered sensors. This is particularly useful for enabling cameras along a likely path of an intruder.
  • the various components of such a process can be implemented using one or more general purpose processors configured with appropriate software, one or more custom processors, programmable logic devices, analog/digital circuits, integrated circuit devices and combinations thereof.
  • FIG. 6 shows a flow diagram for logic used to enable cameras for a security system, according to an example embodiment of the present invention.
  • this logic can be implemented in place of enable logic blocks 506 and 512 ( e.g., as a function call in a software routine).
  • the process begins at block 602 where it proceeds to block 604.
  • Block 604 can implement a delay before enabling any cameras. If no delay is require, the delay step can be skipped. In one instance, the delay can be a fixed delay for each camera. In another instance, the delay can be a function of data stored in the mapping table along with other variables, such as the current mode of the security system. After the delay, if any, is implemented, the process proceeds to block 606.
  • the process proceeds to block 610.
  • FIG. 7 shows a block diagram of an interface for implementing differing levels of access to a security system, to an example embodiment of the present invention.
  • FIG. 7 depicts a security interface 704 that provides two control/access levels 706 and 712 for different users of the system.
  • the different control levels can be particularly useful for simplifying the control aspects available to an end user 702, while allowing additional functionality to be configured by a qualified installer 710.
  • the control levels can also be particularly useful for reducing the risk of an end user 702 improperly configuring the security system, by limiting the control of certain aspects of the system.
  • the security system can be configured such that a minimum level of security is maintained, regardless of the end user 702 configuration changes.
  • Security interface 704 is accessed using a number of different mechanisms.
  • a non-exhaustive list of acceptable interfaces includes a general purpose computer connected through Ethernet, USB or the like, key pads, touch screens, voice response systems and keyfobs.
  • Security interface 704 provides a different level of access depending upon the user.
  • the user credentials can be determined by a username and/or password, electronic identification cards, wireless transmitters, biometric identifications or the like. Once the user credentials are determined, the user is granted an appropriate level of control over the system as shown by blocks 708 and 714. The number of different levels of control and user can vary depending upon the particular application.
  • a first level e.g., full access
  • a second level e.g., limited access
  • a third level e.g., mode change only
  • FIG. 8 shows a block diagram of an interface for implementing differing levels of access to a security system, to an example embodiment of the present invention.
  • FIG. 8 depicts a security system 808 that allows end user 802 access using end user interface 804 and qualified installer 814 access using qualified installer interface 812.
  • the security system 808 allows end user 802 access using end user interface 804 and qualified installer 814 access using qualified installer interface 812.
  • subset of control features 806 could be provided through a touch screen or local computer.
  • Such interfaces may be subject to potential security risks (e.g., hacking into the computer remotely or gaining access to the touch screen prior when the system is not armed) that may compromise the security system.
  • the overall security can be improved.
  • a higher level of control (e.g., installer control features 810) can be provided using a more secure interface method.
  • the interface might only accept a security card that is controlled by the installer, or it may only accept instructions from a known server or input port. Accordingly, the security system is not entirely compromised simply by compromising the end user interface 804. This can also be particularly useful for limiting the complexity by essentially hiding certain configuration options from the end user.
  • FIG. 9 shows a block diagram of another interface that provides administrative monitoring of configuration settings for a security system, to an example embodiment of the present invention.
  • FIG. 9 depicts an end user interface 904 that allows end user 902 to access control logic 916.
  • End user interface 904 sends data to and from end user 902 using network 906.
  • End user is able to configure control logic 916 and monitor the status of sensors 912 and cameras 914 through such data transfers.
  • Offsite administrator 908 provides monitoring functions for all or a subset of end user transactions. For instance, offsite administrator 908 can monitor configuration settings for control logic 916 to verify that the system is not compromised due to user error or an unauthorized person.
  • the monitoring can be limited to critical functions, such as disabling sensors 912 and cameras 914, In other instances, the monitoring can encompass all transactions.
  • This monitoring can be accomplished using an automated process that follows a rule set designed to identify potential issues.
  • the monitoring can also be accomplished using (alone or in combination with automated processes) human operators that watch for potential problems.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Claims (15)

  1. Integrierte Sicherheitsanordnung, umfassend:
    eine Vielzahl von Einbruchssensoren (10, 204);
    einen Bewegungssensor (20, 204) zum Wahrnehmen von Bewegung in einem Zielbereich;
    eine Bilderfassungsvorrichtung (25, 202), welche physikalisch in dem Bewegungssensor (20, 204) integriert ist, um als Reaktion auf den Bewegungssensor (20, 204) Bilder des Zielbereichs zu erfassen, wenn der Bewegungssensor als Reaktion auf zumindest einen ausgewählten einen aus den Einbruchssensoren (10, 204) scharf gemacht ist; und
    eine Steuerungsanordnung (45, 206), welche eine Verknüpfungsdatenbank beinhaltet, welche Daten enthält, welche verwendet werden, um einen oder mehrere aus der Vielzahl der Einbruchssensoren mit der Bilderfassungsvorrichtung zu verknüpfen und einem Benutzer zu erlauben, die Verknüpfungsdatenbank zu konfigurieren, um den zumindest einen aus der Vielzahl von Einbruchssensoren, auf welchen die Bilderfassungsvorrichtung reagiert, auszuwählen, sodass der entsprechende Bewegungssensor der Bilderfassungsvorrichtung als Reaktion auf den einen oder die mehreren zugehörigen Einbruchssensoren scharf gemacht werden kann.
  2. Anordnung nach Anspruch 1, weiter eine Basiseinheit beinhaltend, welche die Bilderfassungsvorrichtung physikalisch in den Bewegungssensor integriert, und wobei die Steuerungsanordnung konfigurierbar ist, um Ansprechempfindlichkeit der Bilderfassungsvorrichtung auf den Bewegungssensor und den Ausgewählten aus den Einbruchssensoren zu übersteuern und die Bilderfassungsvorrichtung zu veranlassen, als Reaktion auf einen in der Steuerungsanordnung empfangenen Sicherheitscode Bilder des Zielbereichs zu erfassen, und weiter eine Benutzerschnittstelle beinhaltend, welche Daten zur Konfiguration der Verknüpfungsdatenbank empfängt.
  3. Anordnung nach Anspruch 1, wobei die Steuerungsanordnung konfigurierbar ist, um die Bilderfassungsvorrichtung zu veranlassen, als Reaktion auf einen in der Steuerungsanordnung empfangenen Sicherheitscode Bilder des Zielbereichs zu erfassen.
  4. Integrierte Sicherheitsanordnung nach Anspruch 1, wobei das Konfigurieren der Verknüpfungsdatenbank auf Basis von unterschiedlichen Steuerungsebenen für unterschiedliche Benutzer eingeschränkt ist, wobei eine Steuerungsebene die Konfiguration der Verknüpfungsdatenbank erlaubt.
  5. Integrierte Sicherheitsanordnung nach Anspruch 1, weiter eine Kommunikationsvorrichtung zum Übertragen von drahtlosen Signalen an einen in der Ferne positionierten zentralen Controller und ein Gehäuse zur Aufnahme der Kommunikationsvorrichtung, der Steuerungseinheit, des Bewegungssensors, einer Batterie und der Bilderfassungsvorrichtung beinhaltend.
  6. Integrierte Sicherheitsanordnung nach Anspruch 1, wobei mehrere Sensoren in der Verknüpfungsdatenbank vernetzt sind und dadurch erforderlich ist, dass mehr als ein Sensor ausgelöst wird, bevor die Bilderfassungsvorrichtung Bilder erfasst.
  7. Integrierte Sicherheitsanordnung nach Anspruch 1, wobei, als Reaktion auf in der Verknüpfungsdatenbank gespeicherte Daten, eine zweite Bilderfassungsvorrichtung als Reaktion auf das Erfassen von Bildern durch eine erste Bilderfassungsvorrichtung Bilder erfasst.
  8. Integrierte Sicherheitsanordnung nach Anspruch 1, weiter eine Benutzerschnittstelle und eine Installationsschnittstelle beinhaltend, welche jeweils Eingaben zum Konfigurieren der Verknüpfungsdatenbank empfangen, wobei die Benutzerschnittstelle eine erste Ebene des Zugriffs auf die Verknüpfungsdatenbank hat und die Installationsschnittstelle eine zweite Ebene des Zugriffs auf die Verknüpfungsdatenbank hat, und wobei die erste Ebene des Zugriffs eine Teilmenge der zweiten Ebene des Zugriffs ist.
  9. Integrierte Sicherheitsanordnung nach einem der vorstehenden Ansprüche, wobei, in einem ersten Modus, die Bilderfassungsvorrichtung ein oder mehrere Standbilder erfasst, und, in einem zweiten Modus, die Bilderfassungsvorrichtung Videobilder erfasst.
  10. Integrierte Sicherheitsanordnung nach Anspruch 1, wobei die Bilderfassungsvorrichtung den Bewegungssensor beinhaltet und darin integriert ist, und weiter eine Benutzerschnittstelle beinhaltend, welche Daten zum Konfigurieren der Verknüpfungsdatenbank empfängt, und wobei die Verknüpfungsdatenbank Daten speichert, welche die Bilderfassungsvorrichtung und jeden aus der Vielzahl von Einbruchssensoren identifizieren.
  11. Integrierte Sicherheitsanordnung, umfassend:
    einen Einbruchssensor (10, 204);
    eine Vielzahl von Bewegungssensoren (20, 204) zum Wahrnehmen von Bewegung in entsprechenden Zielbereichen;
    eine ausgewählte zumindest eine aus einer Vielzahl von Bilderfassungsvorrichtungen (25, 202), wobei die ausgewählte Bilderfassungsvorrichtung physikalisch in einem Entsprechenden aus der Vielzahl von Bewegungssensoren (20, 204) integriert ist, um Bilder des entsprechenden Zielbereichs als Reaktion auf den entsprechenden Bewegungssensor (20, 204) zu erfassen, wenn der Bewegungssensor als Reaktion auf den Einbruchssensor (10, 204) scharf gemacht ist; und
    eine Steuerungsanordnung (45, 206), welche eine Verknüpfungsdatenbank beinhaltet, welche Daten enthält, welche verwendet werden, um den Einbruchssensor mit der ausgewählten Bilderfassungsvorrichtung zu verknüpfen und einem Benutzer zu erlauben, die Verknüpfungsdatenbank zu konfigurieren, um zumindest den einen aus der Vielzahl von Bilderfassungsvorrichtungen, welcher auf den Einbruchssensor reagiert, auszuwählen, sodass der entsprechende Bewegungssensor der ausgewählten Bilderfassungsvorrichtung als Reaktion auf den Einbruchssensor scharf gemacht werden kann.
  12. Integrierte Sicherheitsanordnung nach Anspruch 11, wobei die Bilderfassungsvorrichtungen jeweils als Teil einer Basiseinheit, welche batteriebetrieben ist, in entsprechenden Bewegungssensoren integriert sind, und weiter eine Benutzerschnittstelle beinhaltend, welche Daten zum Konfigurieren der Verknüpfungsdatenbank empfängt, und wobei das Konfigurieren der Verknüpfungsdatenbank auf Basis einer Steuerungsebene, welche mit einem Benutzer verknüpft ist, welcher die Daten zum Konfigurieren der Verknüpfungsdatenbank bereitstellt, eingeschränkt ist, und wobei das Konfigurieren der Verknüpfungsdatenbank auf Basis einer unterschiedlichen Steuerungsebene für einen unterschiedlichen Benutzer eingeschränkt ist.
  13. Integrierte Sicherheitsanordnung nach Anspruch 11, wobei, nachdem die ausgewählte zumindest eine aus einer Vielzahl von Bilderfassungsvorrichtungen ein Bild erfasst, und nach einer Verzögerung, eine weitere eine aus den Bilderfassungsvorrichtungen als Reaktion auf in der Verknüpfungsdatenbank gespeicherte Daten und unabhängig von zusätzlichen Sensoren aktiviert wird.
  14. Integrierte Sicherheitsanordnung nach Anspruch 11, weiter eine Benutzerschnittstelle und einer Installationsschnittstelle beinhaltend, welche jeweils Eingaben zum Konfigurieren der Verknüpfungsdatenbank empfangen, wobei die Benutzerschnittstelle eine erste Ebene des Zugriffs auf die Verknüpfungsdatenbank hat und die Installationsschnittstelle eine zweite Ebene des Zugriffs auf die Verknüpfungsdatenbank hat.
  15. Integrierte Sicherheitsanordnung nach Anspruch 11, wobei, als Reaktion auf einen vom Benutzer ausgewählten Modus, die Steuerungsanordnung zwei oder mehr Bilderfassungsvorrichtungen aus der Vielzahl von Bilderfassungsvorrichtungen konfiguriert, nacheinander Bilder unabhängig von ihren jeweiligen Bewegungssensoren zu erfassen, die Steuerungsanordnung konfiguriert ist, Signale von der Vielzahl von Bilderfassungsvorrichtungen als Funktion von Kommunikationsintervallen zu empfangen und Leistung durch Verringerung oder Beenden der ausgewählten Funktionen zu entfernen, und wobei die Verknüpfungsdatenbank Daten speichert, welche jede aus der Vielzahl von Bilderfassungsvorrichtungen identifizieren.
EP07751528.6A 2006-03-24 2007-02-23 Sicherheitsüberwachung mit programmierbarem mapping Active EP2011093B1 (de)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US78557006P 2006-03-24 2006-03-24
US11/388,764 US7463145B2 (en) 2005-09-22 2006-03-24 Security monitoring arrangement and method using a common field of view
US11/389,673 US7835343B1 (en) 2006-03-24 2006-03-24 Calculating transmission anticipation time using dwell and blank time in spread spectrum communications for security systems
PCT/US2007/004773 WO2007111802A2 (en) 2006-03-24 2007-02-23 Security monitoring with programmable mapping

Publications (3)

Publication Number Publication Date
EP2011093A2 EP2011093A2 (de) 2009-01-07
EP2011093A4 EP2011093A4 (de) 2012-05-09
EP2011093B1 true EP2011093B1 (de) 2018-06-20

Family

ID=38541610

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07751528.6A Active EP2011093B1 (de) 2006-03-24 2007-02-23 Sicherheitsüberwachung mit programmierbarem mapping

Country Status (3)

Country Link
EP (1) EP2011093B1 (de)
ES (1) ES2677274T3 (de)
WO (1) WO2007111802A2 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10778887B1 (en) * 2019-05-30 2020-09-15 Ambarella International Lp Security application using camera SOC with multi-sensor capabilities

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9172921B1 (en) 2013-12-06 2015-10-27 SkyBell Technologies, Inc. Doorbell antenna
US10440165B2 (en) 2013-07-26 2019-10-08 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US9196133B2 (en) 2013-07-26 2015-11-24 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9769435B2 (en) 2014-08-11 2017-09-19 SkyBell Technologies, Inc. Monitoring systems and methods
US11909549B2 (en) 2013-07-26 2024-02-20 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US20170263067A1 (en) 2014-08-27 2017-09-14 SkyBell Technologies, Inc. Smart lock systems and methods
US9049352B2 (en) 2013-07-26 2015-06-02 SkyBell Technologies, Inc. Pool monitor systems and methods
US11004312B2 (en) 2015-06-23 2021-05-11 Skybell Technologies Ip, Llc Doorbell communities
US11889009B2 (en) 2013-07-26 2024-01-30 Skybell Technologies Ip, Llc Doorbell communication and electrical systems
US9247219B2 (en) 2013-07-26 2016-01-26 SkyBell Technologies, Inc. Doorbell communication systems and methods
US11651665B2 (en) 2013-07-26 2023-05-16 Skybell Technologies Ip, Llc Doorbell communities
US11764990B2 (en) 2013-07-26 2023-09-19 Skybell Technologies Ip, Llc Doorbell communications systems and methods
US9736284B2 (en) 2013-07-26 2017-08-15 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US9118819B1 (en) 2013-07-26 2015-08-25 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9060104B2 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9058738B1 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10733823B2 (en) 2013-07-26 2020-08-04 Skybell Technologies Ip, Llc Garage door communication systems and methods
US9172922B1 (en) 2013-12-06 2015-10-27 SkyBell Technologies, Inc. Doorbell communication systems and methods
US20180343141A1 (en) 2015-09-22 2018-11-29 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9179108B1 (en) 2013-07-26 2015-11-03 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9237318B2 (en) 2013-07-26 2016-01-12 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10672238B2 (en) 2015-06-23 2020-06-02 SkyBell Technologies, Inc. Doorbell communities
US10708404B2 (en) 2014-09-01 2020-07-07 Skybell Technologies Ip, Llc Doorbell communication and electrical systems
US9142214B2 (en) 2013-07-26 2015-09-22 SkyBell Technologies, Inc. Light socket cameras
US9160987B1 (en) 2013-07-26 2015-10-13 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9179109B1 (en) 2013-12-06 2015-11-03 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9113051B1 (en) 2013-07-26 2015-08-18 SkyBell Technologies, Inc. Power outlet cameras
US9342936B2 (en) 2013-07-26 2016-05-17 SkyBell Technologies, Inc. Smart lock systems and methods
US9094584B2 (en) 2013-07-26 2015-07-28 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9230424B1 (en) 2013-12-06 2016-01-05 SkyBell Technologies, Inc. Doorbell communities
US9197867B1 (en) 2013-12-06 2015-11-24 SkyBell Technologies, Inc. Identity verification using a social network
US9060103B2 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell security and safety
US9113052B1 (en) 2013-07-26 2015-08-18 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10204467B2 (en) 2013-07-26 2019-02-12 SkyBell Technologies, Inc. Smart lock systems and methods
US10044519B2 (en) 2015-01-05 2018-08-07 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9179107B1 (en) 2013-07-26 2015-11-03 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9065987B2 (en) 2013-07-26 2015-06-23 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9172920B1 (en) 2014-09-01 2015-10-27 SkyBell Technologies, Inc. Doorbell diagnostics
US9013575B2 (en) 2013-07-26 2015-04-21 SkyBell Technologies, Inc. Doorbell communication systems and methods
WO2015031812A1 (en) * 2013-08-30 2015-03-05 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9253455B1 (en) 2014-06-25 2016-02-02 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9743049B2 (en) 2013-12-06 2017-08-22 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9786133B2 (en) 2013-12-06 2017-10-10 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9799183B2 (en) 2013-12-06 2017-10-24 SkyBell Technologies, Inc. Doorbell package detection systems and methods
US9888216B2 (en) 2015-09-22 2018-02-06 SkyBell Technologies, Inc. Doorbell communication systems and methods
US20170085843A1 (en) 2015-09-22 2017-03-23 SkyBell Technologies, Inc. Doorbell communication systems and methods
US11184589B2 (en) 2014-06-23 2021-11-23 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US10687029B2 (en) 2015-09-22 2020-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
CN106204974A (zh) * 2014-08-11 2016-12-07 云铃科技股份有限公司 门铃通信系统及方法
US9997036B2 (en) 2015-02-17 2018-06-12 SkyBell Technologies, Inc. Power outlet cameras
US10692340B2 (en) 2015-02-23 2020-06-23 Ecolink Intelligent Technology, Inc. Smart barrier alarm device
US9940797B2 (en) * 2015-02-23 2018-04-10 Ecolink Intelligent Technology, Inc. Smart barrier alarm device
US10742938B2 (en) 2015-03-07 2020-08-11 Skybell Technologies Ip, Llc Garage door communication systems and methods
US11575537B2 (en) 2015-03-27 2023-02-07 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US11381686B2 (en) 2015-04-13 2022-07-05 Skybell Technologies Ip, Llc Power outlet cameras
US11641452B2 (en) 2015-05-08 2023-05-02 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US20180047269A1 (en) 2015-06-23 2018-02-15 SkyBell Technologies, Inc. Doorbell communities
US10706702B2 (en) 2015-07-30 2020-07-07 Skybell Technologies Ip, Llc Doorbell package detection systems and methods
EP3203454A3 (de) * 2016-02-08 2017-11-29 Essence Security International Ltd. Bewegungssensor
US10043332B2 (en) 2016-05-27 2018-08-07 SkyBell Technologies, Inc. Doorbell package detection systems and methods
US10909825B2 (en) 2017-09-18 2021-02-02 Skybell Technologies Ip, Llc Outdoor security systems and methods
US11074790B2 (en) 2019-08-24 2021-07-27 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US11657687B2 (en) 2021-05-17 2023-05-23 Ecolink Intelligent Technology, Inc. Smart security barrier sensor

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5473368A (en) * 1988-11-29 1995-12-05 Hart; Frank J. Interactive surveillance device
US6954859B1 (en) * 1999-10-08 2005-10-11 Axcess, Inc. Networked digital security system and methods
US6501502B1 (en) * 2000-06-29 2002-12-31 Kuo-Cheng Chen Automatic detector for starting security cameras
US6504479B1 (en) * 2000-09-07 2003-01-07 Comtrak Technologies Llc Integrated security system
GB2380885A (en) * 2001-10-11 2003-04-16 Hewlett Packard Co Multiple camera arrangement
CN1898707B (zh) * 2003-11-18 2011-08-10 英特图形软件技术公司 数字视频监视
WO2006017402A2 (en) * 2004-08-06 2006-02-16 Ipix Corporation Surveillance system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10778887B1 (en) * 2019-05-30 2020-09-15 Ambarella International Lp Security application using camera SOC with multi-sensor capabilities

Also Published As

Publication number Publication date
WO2007111802A3 (en) 2008-11-06
WO2007111802A2 (en) 2007-10-04
EP2011093A2 (de) 2009-01-07
ES2677274T3 (es) 2018-07-31
EP2011093A4 (de) 2012-05-09

Similar Documents

Publication Publication Date Title
US9679455B2 (en) Security monitoring with programmable mapping
EP2011093B1 (de) Sicherheitsüberwachung mit programmierbarem mapping
AU2006294985B8 (en) Security monitoring arrangement and method using a common field of view
AU2022202582B2 (en) Doorbell call center
US10049560B1 (en) Handling duress input
US6163257A (en) Security system having event detectors and keypads with integral monitor
US11640736B2 (en) Controlled indoor access using smart indoor door knobs
US8714449B2 (en) Method and device for arming and disarming status in a facility monitoring system
EP3432284B1 (de) System und verfahren zur herstellung eines alternativen übertragungsweges zwischen einer zentralen überwachungsstation und einem angeschlossenen sicherheits-/steuerungssystem
CN116457851A (zh) 用于地产监控的系统和方法
KR100857073B1 (ko) 실시간 원격 감시 시스템
KR200188880Y1 (ko) 영상 전송용 보안 시스템
KR101914813B1 (ko) 통신 단말기를 이용한 도어락 제어 장치 및 방법
JP2005208878A (ja) セキュリティシステム
KR20110024370A (ko) 영상제어단말의 자동제어를 통한 사설 경비시스템 및 그 방법
KR20160102914A (ko) 스마트폰을 이용한 무선 보안 시스템
KR200332862Y1 (ko) 사용자 단말기를 이용한 사무실 원격감시장치
JP7128109B2 (ja) 警備システム
KR102083739B1 (ko) 900㎒ 무선통신을 이용한 자가 설치형 보안 시스템
WO2024068031A1 (en) Method and apparatus for authentication in a security system
KR20230144430A (ko) 효과적인 무이경비 시스템

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080923

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

A4 Supplementary search report drawn up and despatched

Effective date: 20120412

RIC1 Information provided on ipc code assigned before grant

Ipc: G08B 13/196 20060101ALI20120405BHEP

Ipc: G08B 1/08 20060101ALI20120405BHEP

Ipc: H04N 7/18 20060101ALI20120405BHEP

Ipc: G08B 19/00 20060101ALI20120405BHEP

Ipc: G08B 13/00 20060101AFI20120405BHEP

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20131213

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20171128

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: RSI VIDEO TECHNOLOGIES, INC.

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602007055160

Country of ref document: DE

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1011132

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180715

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2677274

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20180731

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180620

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180920

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180921

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1011132

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180620

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181020

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602007055160

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20190321

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190223

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20190228

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190228

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190223

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190223

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20200331

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190224

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181022

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20200327

Year of fee payment: 14

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180620

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20070223

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602007055160

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210901

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230602

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20240220

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20240226

Year of fee payment: 18