EP4207127A1 - Détection de cambriolage par distraction - Google Patents

Détection de cambriolage par distraction Download PDF

Info

Publication number
EP4207127A1
EP4207127A1 EP21218150.7A EP21218150A EP4207127A1 EP 4207127 A1 EP4207127 A1 EP 4207127A1 EP 21218150 A EP21218150 A EP 21218150A EP 4207127 A1 EP4207127 A1 EP 4207127A1
Authority
EP
European Patent Office
Prior art keywords
door
main entrance
management device
local management
building
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21218150.7A
Other languages
German (de)
English (en)
Inventor
Nicholas J. HAckett
Julien PIEDBOIS
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verisure SARL
Original Assignee
Verisure SARL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisure SARL filed Critical Verisure SARL
Priority to EP21218150.7A priority Critical patent/EP4207127A1/fr
Priority to IL313982A priority patent/IL313982A/en
Priority to PCT/EP2022/087833 priority patent/WO2023126379A1/fr
Publication of EP4207127A1 publication Critical patent/EP4207127A1/fr
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • G08B29/188Data fusion; cooperative systems, e.g. voting among different detectors
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements

Definitions

  • the present invention relates generally to security monitoring system installations for premises, and in particular to installations, local management devices, and corresponding methods arranged to detect the possible occurrence of distraction burglaries.
  • Security monitoring systems for monitoring premises typically provide a means for detecting the presence and/or actions of people at the premises and reacting to detected events.
  • alarm systems typically include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit or local management device), generally mains powered, that is coupled to the sensors, detectors, cameras, etc.
  • nodes which processes received notifications and determines a response.
  • the local management device or central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a remotely located monitoring station where, typically, human operators manage the responses required by different alarm and notification types.
  • These monitoring stations are often referred to as Central Monitoring Station (CMS) because they may be used to monitor a large number of security monitoring systems distributed around the monitoring station, the CMS located rather like a spider in a web.
  • CMS Central Monitoring Station
  • the local management device or central unit at the premises installation typically processes notifications received from the nodes in the installation and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system - in particular whether it is fully or only partially armed, and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • the ubiquitous armed mode is sometimes referred to as the "armed away" mode - in which the security monitoring system both secures the perimeter of the premises, and also monitors the interior of the premises with the possibility of an alarm event being triggered not only by a detected breach of the secured perimeter (for example upon the opening of a door or window provided typically with a node that senses opening based on a change in a magnetic field) but also upon motion been detected within the premises.
  • a second armed mode sometimes referred to as "armed at home”, secures the perimeter, so that opening of a monitored door or window constitutes an alarm event, but typically movement within the house is not monitored and hence movement does not give rise to an alarm event.
  • night mode there may be a third armed mode, which may be referred to as "night mode", and in which the perimeter is secured and movement within the sleeping accommodation of the premises is not monitored but movement within the living accommodation of the premises is monitored. If the security monitoring system has motion sensors in the living accommodation (e.g. on the ground floor, or "downstairs") but not in the sleeping accommodation (e.g. upstairs) then this night mode may simply be the same as the "armed away" mode.
  • the idea behind using the "night mode" is of course to provide a warning of and to any intruders who break into, or move around within, the living accommodation - which is commonly on the ground floor and hence more readily accessible than the sleeping accommodation that is commonly on an upper floor, while permitting residents occupying the sleeping accommodation to move within and between bedrooms and bathrooms without triggering an alarm.
  • Many burglaries take place at night when there is more likelihood that the living accommodation will be vacant, but the sleeping accommodation occupied - and hence when the sounding of an alarm both to alert the legitimate residents and hopefully deter the intruders has increased value.
  • distraction burglary typically involves getting a resident to open the (front) door of the house, even if the house is protected by a security monitoring system that is armed, the resident will need to disarm the system (from armed at home to disarmed) so that their opening of the front door doesn't trigger the system and cause a false alarm. So, while the resident stands at the open front door listening to the first villain's plausible distraction, the villain's accomplice can be safe in the knowledge that opening a door or window at the back of the home (or anywhere else out of sight of the resident at the front door) will not trigger the security monitoring system - a window can be broken, or a window or door forced, open with a low risk of an alarm sounding.
  • the second villain on gaining admittance will quickly grab whatever valuables are to hand. If the first villain is good at his game, the second villain may know that he has time to run to the main bedroom to riffle drawers looking for valuables, as well as to grab any handbags or wallets, etc. that are in sight.
  • Embodiments of the invention are based on the insight that it may be possible to detect a distraction burglary, possibly even before it has been committed, by checking for the tell-tale signs of such a burglary whenever someone approaches a main entrance of an occupied dwelling or similar building.
  • a range of different technologies may be used to detect the presence of someone at the main entrance, of someone outside approaching or proximate the perimeter of the dwelling remote from the main entrance, and/or to detect the opening of an accessible door or window remote from the main entrance.
  • particularly good results may be achieved using a radio-based location sensing arrangement to detect human presence and location based on detecting perturbations of radio signals.
  • a security monitoring system for a dwelling configured to respond to the following set of events:
  • a security monitoring system for a building configured to respond to the following sequence of events: the detection of presence outside the building at a main entrance of the building, the main entrance having a door; the detection of a person inside the building at or approaching the main entrance from inside the building; and the detection of the opening of the door of the main entrance; in combination with the detection of someone outside approaching or proximate the perimeter of the building remote from the main entrance and/or the opening of an accessible door or window remote from the main entrance; by determining an alarm condition and reporting the alarm condition to a remote monitoring station and/or sounding an alarm at the building.
  • the building is a dwelling, home, house, or the like rather than a business premises.
  • a method performed by a security monitoring installation of a dwelling, of detecting a distraction burglary at the dwelling, the method comprising, in response to becoming aware of the presence of someone outside the dwelling at a main entrance of the dwelling, the main entrance having a door, the steps of:
  • a local management device for a security monitoring system for a building, the local management device being configured for operative coupling to a plurality of alarm event sensors and to a remote monitoring station, and to respond to the following sequence of events:
  • Figure 1 is a schematic plan of a single storey dwelling 100 which we will use to illustrate aspects of the invention.
  • the dwelling has a front door 102, the dwelling's main entrance, that is accessed externally by a path 104.
  • a doorbell 105 is provided adjacent the front door, preferably in the form of a video doorbell which should preferably be arranged to provide a view of the whole of the front approach of the house (by means of which the front door can be accessed) including the path 104.
  • the main entrance 102 leads into a hall 106 by means of which all the rooms of the house may be accessed.
  • the dwelling has a rear door 108 that leads out from a kitchen 110 onto a terrace 112.
  • Each of the rooms includes at least one window 114, or in the case of the living room 116 and master bedroom 118 a pair of French Windows 120 that open out onto the terrace 112.
  • the front 102 and back 108 doors are each provided with a sensor arrangement 122 that is triggered by the opening of the relevant door - for example, a sensor arrangement 122 including a magnetically triggered sensor such as a reed relay or a magnetometer.
  • the living room's French Windows permit access to the terrace and a rear garden, but are not intended, or used, for regular access to the interior of the premises.
  • These doors 120 may not be provided with any sensing arrangement to detect their opening (to reduce the cost of installing the security monitoring system), but preferably are.
  • windows 114 to the kitchen 110, other bedrooms 124,134, and dining room 126 may also not be provided with any sensing arrangement to detect their opening (but preferably are) - again as a means of reducing the cost of installing the security monitoring system.
  • the security monitoring system includes a controller or central unit (which may also be referred to as a local management device) 128 which is operatively coupled to the door opening sensors 122 and any other sensors of the system preferably wirelessly using radio frequency (RF) communication rather than via a wired connection.
  • a controller or central unit which may also be referred to as a local management device 128 which is operatively coupled to the door opening sensors 122 and any other sensors of the system preferably wirelessly using radio frequency (RF) communication rather than via a wired connection.
  • RF radio frequency
  • the central unit 128 is operatively connected, for example via a wired and/or wireless Internet connection, to a remote monitoring station 200 to which alarm events are communicated for review and for appropriate intervention or other action to be taken - and preferably the remote monitoring station 200 (also referred to as a central monitoring station, CMS, given that one such station typically supports several or many security monitoring installations) is staffed by human operatives who can for example review images, video, and/or sound files, plus other alert types and details, in order to decide whether to deploy private security staff, law enforcement agents, a fire brigade, or medical staff such as paramedics or an ambulance
  • the security monitoring system also includes a user interface or control panel 129 in the hall 106 fairly close to the front door 102.
  • This control panel 129 is provided so that a user can arm and disarm the security monitoring system using either a code or PIN (e.g. a 4 or 6 digit PIN) or a token (using a short-range communication technology e.g. RFID, NFC, BTLE).
  • the control panel may also be used to set the security monitoring system to an armed at home state, optionally directly from an armed away state.
  • the control panel 129 preferably includes a visual display, such as a screen (optionally a touch sensitive display) to provide users with system information, status updates, event reports, and even possibly face to face communication with personnel in the central monitoring station (for which purpose the control panel 129 may have a built-in video camera and optionally lighting).
  • a visual display such as a screen (optionally a touch sensitive display) to provide users with system information, status updates, event reports, and even possibly face to face communication with personnel in the central monitoring station (for which purpose the control panel 129 may have a built-in video camera and optionally lighting).
  • a disarm node 130 typically a rather simpler device - known as a disarm node 130, may be provided to enable a user to disarm or arm the system, again optionally using a PIN, code, or dongle/device.
  • Such a disarm node 130 may include one or more indicator lights, featuring e.g.
  • the disarm node 130 includes both an audio output device (e.g. one or more loudspeakers and optionally an alarm sounder) and a microphone so that a user can talk with a CMS operator if necessary.
  • the control panel 129 and disarm node 130 are preferably provided with at least one radio transceiver for communication with the control unit 128, as well as having at least built-in autonomous power supplies (e.g., each having a battery power supply).
  • the various nodes of the security monitoring system are preferably battery powered and communicate using RF transceivers that consume little power (hence, not relying on Wi-Fi, 802.11 protocols, as these tend to be very power hungry) for control signals and for event reporting and that typically rely on radio frequencies in approved ISM frequency bands - such as between 860 and 900 MHZ.
  • any video cameras will typically include in addition a Wi-Fi transceiver for use in transmitting image and video data, on request, to the central unit.
  • the security monitoring system also includes one or more motion sensors, typically line-of-sight motion sensors such as PIR sensors.
  • motion sensors 131 are installed at various locations in the hall - one between the kitchen 110 and the dining room 126, another towards the other end of the hall between the bathroom 132 and the first of the bedrooms 134, another outside the study 136 and another in the initial entrance part of the hall, the vestibule 138, close to the front door 102.
  • These hall motion sensors are positioned and configured so that each only "sees" a proximate part of the hall, with the result that a person walking from the kitchen to the front door, for example, triggers first the sensor by the kitchen, then that by the study, and finally that in the vestibule.
  • the French Windows 120 are also preferably provided with shock sensors 140, which may be based on an accelerometer or a magnetometer, for example, and which send an alert to the central unit 128 if the window or window frame is struck forcibly (such as during an attempt to break the window or break in through the French window 120.
  • the back door 108 may also be fitted with a shock sensor, particularly if the door is largely glazed - so that access to the interior of the premises could be obtained by breaking or removing the glass. Other large windows that could also potentially provide access to the interior if their glass was broken or removed may also be provided with shock sensors. Because of our interest in knowing about presence at the front door, we may also want to provide a shock sensor at the front door too, as in this way we may detect when someone knocks at the front door rather than ringing the doorbell 105. Of course, if the doorbell 105 is a video doorbell the system can be so configured that presence alerts (e.g., push communications) from the doorbell are received by the central unit 128.
  • presence alerts e.g., push communications
  • a freestanding motion sensor such as a PIR sensor(s), an ultrasonic or optical presence sensing arrangement, or a presence sensing arrangement that uses LIDAR, which scans or monitors a zone in front of the front door, in each case arranged so that the presence sensing arrangement will be triggered by anyone approaching or presenting themselves at the front door, or a pressure pad or pads located where someone presenting themselves at the front door will stand.
  • a freestanding motion sensor such as a PIR sensor(s), an ultrasonic or optical presence sensing arrangement, or a presence sensing arrangement that uses LIDAR, which scans or monitors a zone in front of the front door, in each case arranged so that the presence sensing arrangement will be triggered by anyone approaching or presenting themselves at the front door, or a pressure pad or pads located where someone presenting themselves at the front door will stand.
  • a video camera other than a camera in a video doorbell (e.g. triggered by an internal or external motion sensor) that observes the front door and the approach to the front door (e.g. the path 104 leading up to the front door), but this is a less preferred option because we don't actually need to see images to determine presence - and if we did want frequently to see images we would need to provide a mains power supply to the video camera, because otherwise battery life will tend to be too short.
  • the security monitoring system includes at least one camera, preferably a video camera with an associated (integral or separate) motion sensor, activation of which may cause the camera (or the motion sensor) to report an event to the central unit.
  • the central unit 128 may or may not instruct the camera to transmit images (still or video), for example using a Wi-Fi transceiver, to the central unit for onward reporting to the CMS 200.
  • a first external video camera 142 is provided at the front of the premises, with a view over the front garden, the path 104, the front door 102 and the façade of the house (including each of the windows in the front aspect).
  • a second video camera 144 is provided at the rear of the property, with a view of the rear aspect of the house, including the rear door and all the rear windows, and along the terrace 112.
  • Ginger has a smartphone and Fred has a Bluetooth earpiece coupled to the smartphone meaning that Fred can hear when Ginger has managed to get the resident to the front door, and also listen to the conversation - so that he knows when he should be free from surveillance, and when he needs to vacate the premises.
  • Ginger approaches the front door, and knocks. His knock and/or his approach is/are sensed using one or more of the sensing arrangements provided (e.g. video doorbell, shock sensor, motion sensor, contact pad, etc.) and a corresponding "event" signal is sent to the central unit 128 (e.g. using an internal transceiver for direct communication with the central unit, or possibly indirectly in the form of a push message from a video doorbell).
  • the sensing arrangements e.g. video doorbell, shock sensor, motion sensor, contact pad, etc.
  • a corresponding "event" signal is sent to the central unit 128 (e.g. using an internal transceiver for direct communication with the central unit, or possibly indirectly in the form of a push message from a video doorbell).
  • the central unit 128 is now alerted and waits to see whether the presence is detected of a person inside the building at, or approaching, the main entrance from inside the building - which may be sensed by the hall-mounted motion sensors 130 (as previously described).
  • the central unit 128 When the central unit 128 detects Fred's presence or his entrance in addition to Ginger's arrival, the resident's approach to the front door, and the opening of the front door, an alarm event notification is sent to the remote monitoring station 200.
  • the central unit 122 will preferably be configured automatically to send any captured video/images to the remote monitoring station in the event of reporting an alarm event - by instructing any triggered video camera to transmit any captured video, typically via Wi-Fi, to the central unit 128 which then forwards these to the remote unit 200.
  • An operator at the remote monitoring station will then instruct intervention by security personnel and/or advise the local police of the events unfolding at the premises, taking account of the content of any video provided by the central unit 128.
  • radio-based location sensing based on detecting perturbations of radio signals. This may be used in addition to, or as an alternative to the presence/movement sensing techniques already described.
  • a radio (or wireless) signal as used herein refers to a signal transmitted from a radio transmitter and received by a radio receiver, wherein the radio transmitter and radio receiver operate according to a standard or protocol. Such standards include, but are not limited to, IEEE 802.11.
  • radio transmitters and receivers providing and using radio signals for WFS may operate in non-telecommunications or Industrial, Scientific and Medical (ISM) spectral regions without departing from the scope of the invention.
  • ISM Industrial, Scientific and Medical
  • radio signals to probe a zone or zones of interest, and to analyse and extract statistics from these signals, in particular looking at the physical layer and/or data link layer such as MAC address measurements that expose the frequency response of a radio channel (e.g., CSI or RSSI measurements).
  • CSI CSI or RSSI measurements
  • These measurements are processed to detect anomalies and variations over time, and in particular to detect changes signifying the entrance of a person and/or movement of a person within a monitored zone.
  • the zone(s) to be monitored need to be covered sufficiently by radio signals, but the sources of the radio signals may either already be present before a monitoring system is established-for example from the plurality of Wi-Fi or Bluetooth capable devices that are now dotted around the typical home or office, or the sources may be added specifically to establish a monitoring system.
  • radio-based presence detection system Often some established (i.e., already located or installed) radio devices are supplemented by some extra devices added as part of establishing a radio-based presence detection system.
  • devices pre-installed or specifically added
  • Wi-Fi access points Wi-Fi routers
  • smart speakers Wi-Fi repeaters
  • video cameras and video doorbells smart bulbs, etc.
  • the monitoring network between radio devices that are essentially static (i.e., that remain in the same position for extended periods) rather than relying on devices that are repeatedly moved - such as smart phones, headphones, laptops, and tablet devices. It is not strictly speaking essential for all the devices whose signals are used by the monitoring system to be part of the same network - for example, signals from Wi-Fi access points of neighbouring premises could be used as part of a monitoring system in different premises. Again, a primary consideration is the stability of the signals from the signal sources that are used. Wi-Fi access points provided by broadband routers are seldom moved and rarely turned off, consequently they can generally be relied upon as a stable signal source - even if they are in properties neighbouring the property containing the zone or zones to be monitored.
  • FIG. 2 The idea is illustrated very schematically in Figure 2 , here with an installation 200 including just a single source (or illuminator) 202 and just a single receiver 204, for simplicity, although in practice there will typically be multiple sources (illuminators) and sometimes plural receivers.
  • the installation 200 has been established to monitor a monitored zone 206.
  • Figure 2A we see that in steady state, and in the absence of a person, radio signals are transmitted from the source 202, spread through the monitored zone 206, and are received by the receiver 204.
  • the monitored volume as a filter having a transfer coefficient, and we can see that a received signal is at least in part defined by the properties, or channel response, of the wireless channel through which it propagated. If the environment provided by the monitored volume changes, for example by the addition of a person, then the transfer coefficient of the filter, and the channel response or properties, will also change.
  • the changes in the transfer coefficient, and in the channel response, consequent on the change in the environment of the monitored space, can be detected and quantified by analysing radio signals received by the wireless sensing receiver(s). Both the introduction of an object, e.g. a person, into the monitored space, and movement of that object within the monitored space will change the environment and hence change the effective transfer coefficient and the channel response.
  • an object e.g. a person
  • the radio-based sensing system can be trained by establishing a base setting in which the monitored zone is unoccupied, which is then labelled as unoccupied for example using a smartphone app or the like, and then training occupied states by a person entering, standing, and then walking through each of the zones one by one. Presence at different locations in each of the zones may be captured and labelled in the system in the same way. This process may be repeated with two people, and then optionally with more people. In essence this is a supervised machine learning approach, but other approaches to training may be used.
  • the system may need to be retrained for the base setting if bulky furniture or other large objects (particularly if made of metal) are added to or moved within the monitored space, because these can be expected to change the propagation properties of the relevant zone/space.
  • the data for unoccupied states are preferably retained within a database of "unoccupied" states, even when there are changes to the arrangement of furniture etc. It may not be necessary to retrain for the occupied states if the system can determine a delta function between the previous base state and the new one, because the delta function may also be applicable in occupied states. But if not, it may be sufficient to retrain only a subset of the occupied states previously learnt.
  • the system may also be configured to self-learn to accommodate changes in the characteristics of the zones when unoccupied, and to add newly determined unoccupied state data to the database.
  • FIG. 2 example uses just a single source (illuminator) and a single receiver, as already mentioned generally multiple sources (illuminators) will be used in order to achieve satisfactory coverage of the zone or zones to be monitored. Multiple zones may be monitored by a single receiver through the use of multiple strategically placed sources, but each zone, or some zones of multiples zones may have a dedicate receiver that does not serve other zones. Likewise, a radio signal source (illuminator) may provide illuminating signals for a single monitored zone or for multiple monitored zones.
  • a presence monitoring system (and a security monitoring system including such a presence monitoring system) may use mesh network arrangement, for example a Wi-Fi mesh network, in which multiple devices act as receivers for illuminating signals - either for a single monitored zone or for multiple monitored zones.
  • mesh network arrangement for example a Wi-Fi mesh network, in which multiple devices act as receivers for illuminating signals - either for a single monitored zone or for multiple monitored zones.
  • the central unit 128 here functions as an access point for a Wi-Fi network and as the WFS receiver, and various Wi-Fi devices are positioned around the premises both to perform their normal role but also to act as illuminators for WFS.
  • Wi-Fi extenders 150 which are convenient because they can readily be positioned in any vacant electrical socket, provide good signal strength, and typically have a small form factor. As shown, these may also be used outside - if weatherproof or protected from the weather.
  • the Wi-Fi cameras 142 and 144 can also function as outdoor illuminators to improve the reach of the WFS - which will enable us to detect Fred's approach to the back of the house, before he starts to try the windows and doors.
  • a smart speaker 152 and a Wi-Fi extender 150 are provided as illuminators, while broadband router or gateway 600 provides illumination from within the dining room.
  • broadband router or gateway 600 provides illumination from within the dining room.
  • a "smart plug" 154 acts as illuminator, while in the hall the motion sensors (e.g. PIR detectors) 130 and control panel 129 act as illuminators.
  • Wi-Fi sources and their disposition, is given merely to illustrate a suitable approach - the number of illuminators and the positioning required very much depend upon the area of cover required for WFS and on the size and type of construction of the property being monitored. It may not always be necessary to use external Wi-Fi illuminators in order to extend Wi-Fi sensing to beyond the external walls of a building, but by providing some suitably positioned external illuminated, as shown schematically here, it should be possible to extend the range of WFS to achieve the desired results.
  • Wi-Fi devices With the ubiquity and wide penetration of Wi-Fi devices into the lives of a large proportion of the population of the developed world, it may often the case that no, or very few, Wi-Fi devices need to be added to a home in order to provide a satisfactory level of WFS cover - although that may not always be the case with the elderly.
  • a security monitoring system for a building including a local management device, the local management device being operatively coupled to a plurality of alarm event sensors and configured to respond to the following sequence of events:
  • the local management device is optionally configured to become aware of presence outside the main entrance by receiving a notification from one or more of the following:
  • the local management device is configured to detect the presence of a person inside the building at, or approaching, the main entrance from inside the building based on one or more signals received from one or more motion sensors within the building.
  • the local management device is configured to detect someone outside who is approaching or proximate the perimeter of the building remote from the main entrance based on one or more signals received from one or more of the following:
  • the security monitoring installation of any variant of the first aspect further comprises a radio-based location sensing arrangement to detect human presence and location based on detecting perturbations of radio signals, the local management device being configured to detect one or more of:
  • the local management device is further configured to determine the alarm condition and report the alarm condition to the remote monitoring station and/or sound the alarm at the building when the security monitoring system is in a disarmed state.
  • the local management device is further configured to determine the alarm condition and report the alarm condition to the remote monitoring station and/or sound the alarm at the building when the security monitoring system is in a disarmed state. This means that even though a resident may have disarmed the security monitoring system in order to open the door of the main entrance without triggering an alarm, detection of a distraction burglary can give rise to a local alarm and/or a report to a remote monitoring station - in either case hopefully leading to apprehension of the villains or at least their being scared away before managing to enter the premises.
  • the local management device is configured to take account, when the presence of a person inside the building at the main entrance is detected, of the amount of time that the person is at the main entrance.
  • the door of the main entrance includes at least one door status sensor configured to detect whether the door is ajar, and the local management device is configured to take account of information received from the door status sensor, and optionally the door status sensor is configured to provide information on the use of a security restraint such as a chain that restricts further opening of the door once opened.
  • a security restraint such as a chain that restricts further opening of the door once opened.
  • the local management device is configured also to take account of one or more of the month, the season, the ambient (external) temperature, the temperature inside the dwelling.
  • a local management device of a security monitoring installation of a dwelling of detecting a distraction burglary at the dwelling, the method comprising, in response to the local management device becoming aware of the presence of someone outside the dwelling at a main entrance of the dwelling, the main entrance having a door, the steps of:
  • the local management becoming aware may involve the local management device receiving a notification from a sensor or a sensing arrangement.
  • the sensing arrangement comprises a radio-based location sensing arrangement to detect human presence based on detecting perturbations of radio signals.
  • the monitoring steps are preferably performed by a local management device of the security monitoring installation.
  • monitoring optionally involves the local management device of the security monitoring installation waiting to receive a notification from a sensor or a sensing arrangement.
  • the method is performed by the local management device when the security monitoring installation is disarmed.
  • the local management device taking account of one or more of the following:
  • a local management device for a security monitoring system for a building, the local management device being configured for operative coupling to a plurality of alarm event sensors and to a remote monitoring station, and to respond to the following sequence of events:
  • the radio-based sensing arrangement may be configured to process communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols, and optionally the one or more radio transmitters that are in a common wireless network with the local management device.
  • the local management device includes a radio receiver of the radio-based presence and location sensing system, and optionally the local management device includes a processor and a memory holding software instructions that when run on the processor cause the local management device to process radio signals to derive location and presence data.
  • a sensing arrangement to detect human presence uses changes in channel state information or received signal strength in determining presence.
  • the local management device may be configured to function as an access point of a radio network whose signals are used by a radio-based presence and location sensing system.
  • the radio network for which the local management device functions as an access point includes at least one further access point.
  • the radio network is a Wi-Fi network, and optionally the one or more radio transmitters include one or more of the following: a Wi-Fi access point, a Wi-Fi extender, a smart plug or smart socket, a smart speaker, a smart bulb, a control panel of the security monitoring system, a Wi-Fi-enabled video camera.
  • the local management device is further configured to perform processing of signals as part of the radio-based location sensing arrangement.
  • the local management device may be further configured to use data from the radio-based location sensing arrangement to perform people counting, and optionally to use determine the presence of one or more intruders based on a detected change in the people count when the system is in the nocturnal armed mode.
  • the techniques and methods described in US2020/0302187A1, assigned to Origin Wireless can be used to count occupants and determine their locations in installations, systems and methods according to embodiments of the invention.
  • the local management device can, for example use people counting to keep track of the number of people in the house - and this may include being aware of the number of people who have, for example, gone into the rear garden or who are on the terrace.
  • the opening of a rear access point e.g. door or French window
  • a person entering at the rear of the house is less likely to be a sign of a "rear entry man” like Fred, but rather to be a resident coming back into the house.
  • the local management device may also be configured to receive and store a number corresponding to the number of usual residents - something that is particularly useful if the dwelling is the home of someone who lives alone. In such a case, the local management device can have a high degree of confidence that any activity detected at the rear of the house, while someone (presumably the sole resident) is answering the front door, is likely to be part of a distraction burglary.
  • the system could also be programmed to deal with days or periods when more residents than usual are expected - for example the weekly visit of a cleaner, carer, or heath visitor, or the monthly visits of family or friends. Such information could be entered by the resident or an authorised user or installer using, for example an app on a device or online, or via spoken commands or touch screen input at the control panel 128.
  • FIG 3 is a schematic drawing showing in more detail features of the gateway or central unit 122 of Figures 1 .
  • the gateway 122 includes a first transceiver 430 coupled to the first antenna 480, and optionally a second transceiver 432 coupled to a second antenna 482.
  • the transceivers 430 and 432 can each both transmit and receive, but a transceiver cannot both transmit and receive at the same time.
  • the transceivers 430, 432 each operate in half duplex.
  • a transceiver will use the same frequency to transmit and receive (although of course if the two transceivers are to operate simultaneously but in opposite modes, they will operate on different frequencies).
  • the transceivers 430, 432 may be arranged such that one transceiver 430 uses a first frequency for transmit and receive and the second transceiver 432 uses the same first frequency for transmit and receive, i.e. the transceivers are arranged to operate in a diversity-like arrangement.
  • the second transceiver may, depending on configuration, be arranged to use a second frequency for transmit and/or receive.
  • the transceivers 430 and 432 are coupled to a controller 450 by a bus.
  • the controller 450 is also connected to a network interface 460 by means of which the controller 450 may be provided with a wired connection to the Internet and hence to the monitoring centre 200.
  • the controller 450 is also coupled to a memory 470 which may store data received from the various nodes of the installation for example event data, sounds, images and video data.
  • the central unit 122 also includes a crystal oscillator 451, which is preferably a temperature controlled or oven-controlled crystal oscillator. This is used for system clocking and also frequency control of the transceivers.
  • the gateway 122 includes a power supply 362 which is coupled to a domestic mains supply, from which the gateway 122 generally derives power, and a backup battery pack 464 which provides power to the gateway in the event of failure of the mains power supply.
  • the central unit 122 also includes a Wi-Fi transceiver 440, and associated antenna arrangement 442, which may be used for communication with any of the nodes that is Wi-Fi enabled.
  • the Wi-Fi enabled node may be a remote control or control panel that may for example be located close to the main entrance to the building (e.g., control panel 128 or disarm node 130) to enable the occupier to arm or disarm the system from near the main entrance, or it may for example be an image-capture device such as a video camera.
  • PLMN Public Land Mobile Network
  • GSM Global System for Mobile Communications
  • LTE Public Land Mobile Network
  • a third antenna 484 and associated ISM transceiver 434 may be provided, for example for communication with the monitoring centre 200 over, for example, the European 863MHz to 870MHz frequency band.
  • the third transceiver 434 may be a Sigfox transceiver configured to use the Sigfox network to contact the central monitoring station especially in the event that jamming of other radio channels is detected.
  • the first 430 and second 432 transceivers may both be tuneable ISM devices, operating for example in the European 863MHz to 870MHz frequency band or in the 915MHz band (which may span 902-928MHz or 915-928MHZ depending upon the country). In particular, both of these devices may be tuned, i.e. may be tuneable, to the frequencies within the regulatorily agreed sub-bands within this defined frequency band.
  • the first transceiver and the second transceiver if present, may have different tuning ranges and optionally there is some overlap between these ranges.
  • the controller 450 is configured to run a sensing application using a WFS software agent 800, which may be stored in memory 470.
  • the WFS software agent 400 uses WFS radio APIs in the Wi-Fi transceiver 440 to interact with the Wi-Fi radio, the APIs enabling extraction of desired channel environment measurement information and provides the ability to assert any related controls to configure WFS features. This behaviour will be described in more detail shortly.
  • the sensing application on the CU will report a presence state change when the appropriate thresholds are triggered, along with the address of the device whose received data triggered the algorithm.
  • the WFS agent provides a monitoring system which enables the security monitoring system to detect presence and movement in a monitored space, without the necessity to use line of sight motion detectors.
  • this functionality can be provided on an access point, e.g. a Wi-Fi access point, AP such as router 300, of the premises, with the AP configured to report the result of presence detection to the central unit 122.
  • a Wi-Fi range extender could instead be used as sensing master for its connected nodes and configured to report to the central unit 122 which would be the overall master in terms of reporting the "alarm”.
  • a class of distraction burglaries involves at least two actors (our Fred and Ginger), one of whom (Ginger) keeps a resident occupied at a main entrance of a dwelling, typically the front door, while the other (Fred) enters the dwelling through another door or a window out of sight of the resident, typically at the rear or side of the dwelling.
  • Gay a class of distraction burglaries
  • Ginger the "front door man” of our distraction burglary double act, how this role differs from that of Fred, the "back door man” of the double act, in that it involves keeping the resident engaged in conversation at the door, freeing Fred free from the resident's observation and attention so that Fred is able to enter and roam the dwelling unobserved and without interference. While Ginger's performance at the main entrance is keeping the resident occupied, the resident will stand inside the house, at the entrance - often with the door of the entrance held only slightly ajar rather than wide open.
  • Gingers of the double acts reassure not because they want to enter the dwellings but rather so that the residents will relax enough to feel comfortable talking to Ginger through a door that is not just ajar but is wide open - because it is easier to engage the resident in a much longer dialogue when they have relaxed enough to open the door wide. So, Ginger will often try to persuade the resident to unlatch the security chain, standing back so as to appear less intimidating, and using body language, "patter" and tone of voice chosen to appear friendly, reassuring and non-threatening.
  • the first is whether the door has been opened with a security chain in place - which can be detected using a sensor incorporated in the security chain that senses engagement of the free end of the chain with its corresponding socket or other capture element, optionally in combination with a "door open” sensor provided on the door/the door frame. This may happen when a resident opens the door on returning home - the chain having been engaged by another resident who is at home - but the two situations can readily be distinguished because in a distraction burglary the door is likely to be held open on the chain for an extended period whereas that is unlikely to happen when the door has been opened by a returning resident.
  • a cautious resident may tend, when opening the front door to strangers, to hold the door ajar - at least initially, rather than opening the door wide as is likely when a visitor is known to the resident.
  • sensors to detect that the door has been opened and held ajar by positioning a door opening sensor on the hinge side of the door/frame, or at the upper edge of the door close to the hinge side (between say 50-200mm, from the hinge edge, preferably 70 to 150mm from the hinge edge - although the optimum position depends to some extent on the width of the door: the wider the door, the less it needs to be rotated about the vertical hinge axis for the gap at the open side to be big enough to talk through).
  • any such sensing arrangement should of course be operatively connected to the local management device, for example using an internal transceiver, and preferably powered by an internal power supply such as a battery.
  • the second is the fact that during a distraction burglary a resident is likely to remain at the door, inside the house, for a minute or more, and typically much longer - which again doesn't happen when a resident makes an entrance through the front door. So, we can focus on detecting this "resident pendency" at the main entrance - either using a dedicated motion or presence sensor inside the dwelling at the front door - e.g. by providing one or more PIR sensors (or one or more contact pads on the floor, perhaps under the front door mat or entrance rug) in the hall where the sensor(s) will "see” someone positioned to talk with someone just outside the door but where the sensor(s) will not “see” someone further back inside the house - e.g. further back in the entrance hall.
  • a "rear" entrance by which we mean an entrance remote from the main entrance at which the resident is kept occupied, but which may be a side entrance rather than actually a rear entrance, assuming that the main entrance is the front door
  • This coincidence of opening another entrance door while the front (main) door is in an open condition does occasionally occur without a distraction burglary taking place, but it is not common - and is, for example, unlikely to happen in the winter or when ambient temperatures are less than about 25 Celsius - factors (date/month/time of year, weather, external/internal temperature) which the local management unit can be programmed to take into account in determining whether a distraction burglary is being attempted or is in progress).
  • the local management unit is therefore preferably programmed to take all these factors into account in determining whether a distraction burglary is taking place, although some factors or combinations of circumstances will quickly enable a positive determination to be made, an initially negative determination may become positive based on prolonged pendency, for example.
  • the local management unit may therefore consider some or all of at least the following factors, using a suitably programmed algorithm, in determining whether to raise an alarm with the remote monitoring station based on the existence of a distraction burglary:
  • Wi-Fi Sensing works, and how Wi-Fi Sensing can be integrated into a security monitoring system, and in particular how WFS can be integrated into a central unit of a security monitoring system.
  • Wi-Fi Sensing can be performed with any Wi-Fi device and can be used on any available communication path. Each communication path between two devices gives the chance to extract information about the surrounding environment. Wi-Fi sensing is based on an ability to estimate the wireless channel and hence the surrounding environment. Because Wi-Fi networks comprise many devices spread throughout a geographical area, they are well suited to exploiting these devices' transmissions in effect to provide a radar system. Depending on the number of devices, the radar system may be monostatic, bistatic, or multistatic. In monostatic WFS, a single device measures its own transmitted Wi-Fi signals. In bistatic WFS, the receiver and transmitter are two different devices (for instance, an AP and a STA in infrastructure mode). In multistatic WFS, the received signals from multiple Wi-Fi transmitters are used to learn about a shared environment.
  • At least one Wi-Fi transmitter and one Wi-Fi receiver are required to perform WFS measurements, and these can be located in the same device (to create a kind of monostatic radar) or in different devices.
  • the measurement is always performed by a Wi-Fi Sensing-enabled receiver on the Wi-Fi signal transmitted by a transmitter, and which may or may not originate from a Wi-Fi sensing-capable device.
  • the device that transmits the signal that is used for measurements is called the "illuminator," as its transmissions enable collection of information about the channel - that is, it illuminates the channel.
  • Wi-Fi Sensing measurements are recognised - Passive, Triggered, Invoked, and Pushed, and these depend upon what triggers the illuminator device to transmit a Wi-Fi signal.
  • the agent improves the usefulness of the standard beacon interval by using optimised timings.
  • WFS In passive mode, WFS relies on transmissions that are part of regular Wi-Fi communication.
  • the Wi-Fi Sensing receiver(s) rely only on transmissions between itself and the illuminator device(s). Passive transmissions do not introduce overhead, but the Wi-Fi sensing device lacks control over the rate of transmissions, transmission characteristics (bandwidth, number of antennas, use of beamforming), or environmental measurements.
  • Invoked measurement involves utilizing a packet transmission that is in response to a packet received from the Wi-Fi Sensing receiver device.
  • a transmission is initiated by the illuminator device for measurement.
  • a pushed transmission can be either a unicast or a multicast/broadcast message.
  • Multicast/broadcast messages can be used for measurements by multiple WFS receivers simultaneously if the devices are not in power-save mode.
  • Triggered transmissions introduce overhead because additional over-the-air transmissions are required.
  • Pushed transmissions introduce less overhead compared to invoked transmissions, because the exchange is unidirectional rather than bidirectional.
  • Triggered transmissions allow for a system to control both the rate and occurrence of measurements.
  • a WFS network is made up of one or more WFS illuminators and one or more WFS receivers.
  • a WFS system is made up of three main components and that are present in Wi-Fi Sensing illuminators and receivers:
  • a WFS system can be built based on existing Wi-Fi standards, hardware, software and infrastructure.
  • the fundamental component required to enable Wi-Fi sensing on the radio is the interface to enable control and extraction of periodic channel or environmental measurement data. Regardless of device type, operating band or Wi-Fi generation, the core APIs to enable Wi-Fi sensing are similar, as the required data and control are common.
  • the WFS software Agent can reside on any Wi-Fi device; for example, in the infrastructure mode, the agent may reside on the AP, in which case channel measurements from all the STAs associated with the AP can be collected.
  • the software agent may also be located on a STA. But in the security management system applications this would mean that the STA would either need to be the controller of the security management system (e.g. the CU), or would have to be reporting to the controller of the security management system (e.g. the CU). Generally, we therefore prefer to run the software agent on the CU, and given that the CU is conveniently also an access point, it makes sense for us to run the software agent on the CU acting as AP rather than merely as an STA.
  • the WFS software Agent uses the WFS radio APIs to interact with the Wi-Fi radio, the APIs enabling extraction of desired channel environment measurement information and providing the ability to assert any related controls to configure WFS features.
  • the WFS Agent has two main subsystems: Configuration and Control; and a Sensing Algorithm.
  • the Configuration and Control subsystem interact with the radio, using a standard set of APIs.
  • the Configuration and Control subsystem performs tasks including sensing capability identification, pushed illumination coordination, and radio measurement configuration.
  • the sensing algorithm subsystem includes intelligence needed to extract the desired features from the radio measurement data and may differ according to the desired sensing application.
  • the WFS software Agent is needed on any sensing receiver but is merely optional on an illuminator - only being required if the illuminator also acts as a receiver. If included on an illuminator, only the configuration and control subsystem is needed. By having the agent on the illuminator, additional enhancements are enabled, including sensing capability identification and co-ordinated pushed illumination. If the illuminator is not running an agent, it is still technically able to participate in the sensing network, but only the most basic features that currently exist in Wi-Fi standards will be supported.
  • the WFS software Agent processes and analyses the channel measurement information and makes sensing decisions, such as detecting motion. This information is then shared with the application layer via the Wi-Fi Sensing agent I/O interface. As well as interfacing with the radio and the application layer, the Wi-Fi Sensing agent also interfaces with the existing Wi-Fi services on the system. This interface is necessary for the agent to provide feedback for sensing optimizations that can be used in radio resource management decisions, such as band steering or AP selection requests.
  • the application layer of a WFS system creates the sensing service and in effect presents the information to the end user (in our case to the security management system).
  • the application layer can potentially reside on any networked device: in some embodiments of the present invention, it will reside in the central unit 122 along with the WFS agent, but in other embodiments the application layer may exist in an external server or even in the central monitoring station. We prefer, however, to provide the application layer on the central unit to avoid potential problems with signalling delays (for example due to accidental or deliberate network interruption) between the central unit (or other WFS receiver) and a remotely located entity.
  • the application layer receives input from one or multiple Wi-Fi sensing software agents.
  • a typical Wi-Fi home network follows one of two common deployment scenarios.
  • the first consists of a single AP that serves as the internet gateway for all the devices in the house.
  • the second consists of multiple APs forming an ESS and extending coverage throughout the home.
  • the Wi-Fi Sensing receiver may be the AP and/or other devices in the network. Not all the devices in a home deployment need to be Wi-Fi Sensing capable.
  • Wi-Fi Sensing can be deployed in all types of Wi-Fi networks and topologies, operating in different frequency bands (2.4, 5, 6, and 60 GHz) and different bandwidths.
  • the sensing resolution and performance depends on the use case requirements. In general, it is enhanced with the increase in the number of participating devices and higher bandwidths.
  • Applications that require lower resolutions and longer range, such as home monitoring, can be deployed using Wi-Fi networks operating in 2.4GHz and 5GHz.
  • Applications that require higher resolutions and lower range, such as gesture recognition require 60GHz Wi-Fi networks.
  • Radio resource management (RRM) events such as AP and/or band steering, should be conducted in coordination with the Wi-Fi Sensing agent/operation.
  • the devices involved with Wi-Fi Sensing will depend upon the deployment environment and the specific use case.
  • the sensing measurements also need to be processed by the device with enough computation power.
  • the coordination of sensing, including participating devices, is a role particularly suited to an AP.
  • the central unit of a security monitoring system will have ample processing power, as well as being able to function as an AP, to handle this task efficiently and speedily.
  • Wi-Fi networks The nature of Wi-Fi networks is such that it should be possible able to add additional Wi-Fi sensing capable devices to the network to enhance accuracy, coverage and/or localization.
  • additional devices do not necessarily need to be Wi-Fi Sensing capable or dedicated Wi-Fi sensing devices to participate; however, optionally they may also identify their Wi-Fi sensing capabilities and supported features to the AP.
  • Internet of Things (IoT) devices for home deployment can typically also be used as part of a WFS installation supporting a WFS-enabled security monitoring system: example include Wi-Fi controllable plugs and sockets, light bulbs, thermostats, smart speakers, and video door bells.
  • Wi-Fi Sensing agent may elect not to make use of that device.
  • WFS for a security monitoring system may be run over a dedicated Wi-Fi network, the premises having at least one other Wi-Fi network for other purposes. But for reasons of simplicity and economy it may often be preferred to operate a single Wi-Fi network to serve all a household's (or small business's) needs including WFS for a security monitoring service. If a single-network solution is adopted, performance degradation due to airtime usage and sensing overhead must be minimized and hence Wi-Fi transactions required for conducting sensing measurements and sensing management and processing must be optimized for efficiency.
  • At least one network device executes the sensing software, or Wi-Fi Sensing Agent.
  • the Wi-Fi Sensing agent is typically placed on the AP, but it can be placed on any STA (although, as previously mentioned, we prefer to run the Wi-Fi Sensing agent on the AP).
  • the Wi-Fi Sensing agent should discover the device and its sensing capabilities. Depending on the capabilities of the device, its role in the Wi-Fi sensing network would be determined. If the new device is another Wi-Fi Sensing-capable AP, then coordination among the agents is required.
  • the WFS agent needs to have a mechanism to determine which devices are capable and needs to participate in the sensing for each application on a device-specific basis.
  • a WFS agent also needs to be capable of configuring the radio for measurements and triggering transmissions on a periodic basis for sensing measurements, and to enable/disable measurements or adjust configuration parameters for Wi-Fi sensing-capable devices.
  • the Wi-Fi Sensing agent is also able to request specific radio resource management operations, such as AP or band steering.
  • the WFS agent is also preferably able to detect and process specific sensing events and communicate the relevant information to the application layer (e.g., the security monitoring system) for specific handling and user presentation.
  • Interference can be caused by other Wi-Fi devices operating in the same band, which causes cochannel interference, or in an adjacent channel, which causes adjacent channel interference. It can also be caused by non-W-Fi devices, which can be other communication systems or unintentional transmissions that create electromagnetic noise in the band. Interference can impact Wi-Fi Sensing performance in two ways. Firstly, it may interfere with the sensing transmissions and thereby reduce the number of measurements made in a given time interval. As such, it introduces jitter in time instants during which the measurements are made. Secondly channel-state measurements may capture the impact of transient interference, such as for a non-Wi-Fi device, as opposed to motion in the environment.
  • Wireless systems deploy various techniques to avoid or reduce the impact of interference, and these techniques also help to improve WFS performance. These techniques aim at maximizing the reuse of spectrum, while minimizing the overlap of spectrum used by nearby networks: for example, Dynamic Channel Allocation (DCA); Auto Channel Selection (ACS); optimized RF planning; (e.g., non-overlapping channels and use of reduced channel width when applicable), and power control.
  • DCA Dynamic Channel Allocation
  • ACS Auto Channel Selection
  • optimized RF planning e.g., non-overlapping channels and use of reduced channel width when applicable
  • increasing the number of illuminators may result in a higher sensing performance: with more transmitters that are located sufficiently apart from one another, motion in a larger area can be detected; when motion is detected using transmissions on one or more transmitters, information is provided that can be used to determine localization of the motion; and sensing accuracy is improved with a higher number of measurements taken across a larger number of transmitters in most scenarios.
  • the IEEE 802.11a preamble is useful for Wi-Fi Sensing.
  • the preamble contains a short training field (STF), a guard interval and a long training field (LTF).
  • STF is used for signal detection, automatic gain control (AGC), coarse frequency adjustment and timing synchronization.
  • AGC automatic gain control
  • LTF is used for fine frequency adjustment and channel estimation. Since only 52 subcarriers are present, the channel estimation will consist of 52 frequency points.
  • Newer OFDM PHY versions (HT/VHT/HE) maintain the IEEE 802.11a preamble for backward compatibility and refer to it as the legacy preamble.
  • the legacy preamble spans a 20MHz bandwidth and consists of a legacy STF (L-STF) and legacy LTF (L-LTF).
  • HT/VHT/HE OFDM PHY versions
  • HT/VHT/HE introduce wider channel bandwidths (up to 160MHz) for backward compatibility
  • the legacy preamble is duplicated on each 20MHz channel. This allows the receiver to compute 52, 104, 208 or 416 valid L-LTF frequency points, which represent the channel estimation between the two devices.
  • MIMO training fields present in HT, VHT and HE LTFs.
  • the MIMO fields are modulated using the full bandwidth (20MHz to 160MHz) and are traditionally used by the receiver to estimate the mapping between the constellation outputs and the receive chains. Since these fields span the full bandwidth, they provide more frequency points. For example, a 20MHz L-LTF contains 52 subcarriers, while a 20MHz HT/VHT-LTF contains 56 subcarriers.
  • the latest introduction of the HE PHY has the potential to enhance Wi-Fi Sensing. In addition to enabling operation in the 6GHz spectrum, the HE PHY has increased the number of subcarriers per 20MHz bandwidth by 4x, which effectively allows for better object resolution.
  • the IEEE 802.11ad amendment defines a Directional-Multi-Gigabit (DMG) PHY for operation in the 60GHz band. While there are three different modulation schemes (Control, Single-Carrier and OFDM) defined, Control and the Single Carrier PHY are the primary PHY used in 802.11ad (and is also part of the subsequent 802.11ay amendment). Regardless of the modulation scheme, every packet starts with a preamble that consists of a short training field (STF) and a channel estimation field (CEF). The STF is used for timing estimation and AGC adjustment. CEF is used for channel estimation.
  • STF short training field
  • CEF channel estimation field
  • the necessary channel estimation for Wi-Fi Sensing is available following successful reception and processing of the preamble of a packet and can be provided to the higher layers.
  • the wide channel bandwidth available in 802.11ad/ay can significantly improve the performance of Wi-Fi Sensing in terms of the resolution; however, the limited communication range in 60GHz band restricts the sensing range and coverage.
  • the central unit of a security monitoring system may relay instead on frequency bands with longer range, sufficient to cover the majority of households.
  • the use of the 60GHz band may be attractive and therefore embodiments of the invention may use this band for WFS.
  • the MAC layer mechanisms may be used to obtain information about the connected devices and the roles they play in Wi-Fi sensing.
  • the MAC layer also initiates and drives transmissions required for channel estimation among the devices in the Wi-Fi Sensing network.
  • the first is identifying the devices and the channel estimation mapped to the physical environment between any two devices.
  • an STA is identified by a 48-bit MAC address.
  • a MAC address is sufficient identification for STAs associated with a Wi-Fi network; however, if the association is lost during the lifetime of the application, then randomized MAC addresses may be used. In this case, a different or more involved mechanism would be required to identify each STA. This identification must match the corresponding channel estimate measurement obtained from the PHY.
  • the second is identifying the device network role and its connection type, such as whether it is an AP or an STA, or whether it is part of a mesh or a P2P connection. This information is used by the Wi-Fi Sensing agent to decide the best method for conducting measurements.
  • the third aspect is the identification of WFS device capabilities, such as sensing capabilities, supported measurement rate, and the availability and willingness of the device to participate in sensing measurements. This information is required from all devices in the network for the Wi-Fi Sensing agent to select devices participating in the sensing measurements.
  • NDP null data packet
  • ACK ACK
  • Another example of how an invoked measurement can be triggered is by use of the implicit unidirectional beamforming procedure, first defined in the IEEE 802.11n standard. In this procedure, an STA requests beamforming training by sending a MAC frame with the training request (TRQ) bit set to 1. This triggers the receiving device to send an NDP announcement, followed by an NDP to illuminate the channel.
  • TRQ training request
  • a transmission is triggered by the illuminator to be received by one or multiple Wi-Fi Sensing receivers.
  • Beacon frames are an example of using existing MAC packet exchanges for pushed measurements.
  • either the AP or STA may take the role of sensing receiver; additionally, there may be multiple sensing receivers required to support the application. Moreover, there may be multiple illuminators involved in the measurements. MAC layer coordination is used to coordinate the sensing transmissions among the illuminators and the sensing receivers in an efficient way. MAC layer scheduling may also be used to enable periodic measurements on which some use cases rely. Coordination and scheduling at the MAC layer should enable different options for conducting sensing measurements among multiple illuminators and sensing receivers, with minimal added overhead, while accounting for the power save state of the devices.
  • the WFS agent To interact with the MAC and PHY, the WFS agent has an interface to pass the WFS control information to the radio and extract the measurement data.
  • the interface should be
  • Wi-Fi agnostic and is, therefore, defined in a generic manner and extendable to cover different radio driver implementations, including drivers from different chipset vendors.
  • the interface definition should allow for potential additional features or capabilities provided by a specific PHY or a chipset, as well as a path for growing the technology.
  • Definition of a standard interface/API enables radio firmware and driver developers to ensure compliance and enables reuse of components or common codes, which may be placed into a library.
  • Most Wi-Fi drivers are based on either the wireless-extensions framework or the more recent and actively developed cfg80211 / nl80211 framework. As the system integration components are largely provided, these frameworks enable Wi-Fi driver developers to focus on the hardware aspects of the driver.
  • the WFS interface should provide the WFS agent with STA identification and enable the WFS agent to track the physical device in the network (i.e., the AP to which it is connected), as well as the device's capability and availability to participate in the measurements.
  • the WFS agent requires control of the STAs that will participate in the sensing measurements, as well as what measurement type (passive vs triggered) will be performed.
  • the WFS interface should provide such control, either on a global system scale or on a per STA basis so that the WFS agent can conduct WFS measurements in the most efficient manner.
  • the measurement rate is typically decided by the WFS agent, and the interface should support its control. However, to provide the lowest jitter and best efficiency possible, it is best to rely on the MAC layer for scheduling.
  • WFS applications may have different measurement parameter requirements (bandwidth, antenna configuration, etc.). The configuration of measurement parameters allows the application to obtain only the data it requires to maintain efficiency.
  • the measurement parameters should be configurable independently for each STA.
  • the WFS interface should be flexible enough for the radio to specify whether the data payload is in time-domain or frequency-domain, the numerical format, etc. By having this knowledge, the Wi-Fi Sensing agent can correctly interpret the data.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
EP21218150.7A 2021-12-29 2021-12-29 Détection de cambriolage par distraction Pending EP4207127A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP21218150.7A EP4207127A1 (fr) 2021-12-29 2021-12-29 Détection de cambriolage par distraction
IL313982A IL313982A (en) 2021-12-29 2022-12-23 Intrusion detection while diverting
PCT/EP2022/087833 WO2023126379A1 (fr) 2021-12-29 2022-12-23 Détection de cambriolage de distraction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP21218150.7A EP4207127A1 (fr) 2021-12-29 2021-12-29 Détection de cambriolage par distraction

Publications (1)

Publication Number Publication Date
EP4207127A1 true EP4207127A1 (fr) 2023-07-05

Family

ID=79024975

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21218150.7A Pending EP4207127A1 (fr) 2021-12-29 2021-12-29 Détection de cambriolage par distraction

Country Status (3)

Country Link
EP (1) EP4207127A1 (fr)
IL (1) IL313982A (fr)
WO (1) WO2023126379A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050134450A1 (en) * 2003-12-23 2005-06-23 Honeywell International, Inc. Integrated alarm detection and verification device
US20060059557A1 (en) * 2003-12-18 2006-03-16 Honeywell International Inc. Physical security management system
US20190066464A1 (en) * 2017-07-05 2019-02-28 Oneevent Technologies, Inc. Evacuation system
US20200302187A1 (en) 2015-07-17 2020-09-24 Origin Wireless, Inc. Method, apparatus, and system for people counting and recognition based on rhythmic motion monitoring

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060059557A1 (en) * 2003-12-18 2006-03-16 Honeywell International Inc. Physical security management system
US20050134450A1 (en) * 2003-12-23 2005-06-23 Honeywell International, Inc. Integrated alarm detection and verification device
US20200302187A1 (en) 2015-07-17 2020-09-24 Origin Wireless, Inc. Method, apparatus, and system for people counting and recognition based on rhythmic motion monitoring
US20190066464A1 (en) * 2017-07-05 2019-02-28 Oneevent Technologies, Inc. Evacuation system

Also Published As

Publication number Publication date
IL313982A (en) 2024-08-01
WO2023126379A1 (fr) 2023-07-06

Similar Documents

Publication Publication Date Title
US9947190B2 (en) System and methods for correlating sound events to security and/or automation system operations
US7629880B2 (en) System, method and device for detecting a siren
US9728077B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
WO2023126380A1 (fr) Systèmes de surveillance de sécurité de locaux surveillés à distance
US10989806B2 (en) Home occupant detection and monitoring system
JP2020529771A (ja) ドアベル通信システム及び方法
US20240148264A1 (en) Home Occupant Detection And Monitoring System
EP4207127A1 (fr) Détection de cambriolage par distraction
EP4207123A1 (fr) Système de surveillance de sécurité de locaux
EP4207117A1 (fr) Noeud de capteur pour systèmes de surveillance de sécurité
EP4207120A1 (fr) Système de surveillance de sécurité
EP4207126A1 (fr) Système de surveillance de sécurité de locaux
EP4231263A1 (fr) Système de surveillance de sécurité de locaux
EP4207124A1 (fr) Système de surveillance de sécurité
EP4207122A1 (fr) Localisation des intrus
EP4207119A1 (fr) Systèmes de surveillance de sécurité
EP4231266A1 (fr) Périphérique pour systèmes de surveillance de sécurité de locaux
US11756531B1 (en) Techniques for audio detection at a control system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20231215

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR